Quantcast
Channel: Cisco Talos Blog
Browsing all 1948 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Threat Source newsletter (June 24, 2021)

  Newsletter compiled by Jon Munshaw.Good afternoon, Talos readers.   Even though spam emails asking for gift cards may seem like the oldest trick in the book, they're still effective in 2021. The FBI...

View Article


Image may be NSFW.
Clik here to view.

Beers with Talos, Ep. #106: Is more than executive action in order?

Beers with Talos (BWT) Podcast episode No. 106 is now available. Download this episode and subscribe to Beers with Talos: Apple Podcasts Google PodcastsSpotify  StitcherIf iTunes and Google Play aren't...

View Article


Image may be NSFW.
Clik here to view.

Talos Takes Ep. #58: How to approach the partnerships it will take to defend...

By Jon Munshaw. With major cyber attacks in recent years against major U.S. critical infrastructure suppliers like Norsk Hydro and Colonial Pipeline, we’re in a new world of CI cybersecurity. New...

View Article

Image may be NSFW.
Clik here to view.

Threat Roundup for June 18 to June 25

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 18 and June 25. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Memory corruption vulnerability in PowerISO’s DMG...

Piotr Bania of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.  Cisco Talos recently discovered a memory corruption vulnerability in PowerISO’s handler that deals with DMG files....

View Article


Image may be NSFW.
Clik here to view.

Threat Source newsletter (July 1, 2021)

  Newsletter compiled by Jon Munshaw.Good afternoon, Talos readers.   There's been a lot of talk recently around how to address America's infrastructure cybersecurity. After attacks like Colonial...

View Article

Image may be NSFW.
Clik here to view.

Talos Takes Ep. #59: How to secure the devices that secure your home network

By Jon Munshaw. As consumers start having more “smart” devices connected to their home network, they may want an easy solution to keeping those devices safe. But what if that device gets owned? Carl...

View Article

Image may be NSFW.
Clik here to view.

Threat Roundup for June 25 to July 2

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 25 and July 2. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...

View Article


Image may be NSFW.
Clik here to view.

REvil ransomware actors attack Kaseya in supply chain attack

Attackers are actively exploiting the Kaseya VSA endpoint monitoring software to conduct a widespread supply chain attack targeting a number of Managed Service Providers (MSPs), according to multiple...

View Article


Image may be NSFW.
Clik here to view.

InSideCopy: How this APT continues to evolve its arsenal

By Asheer Malhotra and Justin Thattil. Cisco Talos is tracking an increase in SideCopy's activities targeting government personnel in India using themes and tactics similar to APT36 (aka Mythic Leopard...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Information disclosure, privilege escalation...

Cory Duplantis of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.  Cisco Talos recently discovered multiple vulnerabilities in IOBit Advanced SystemCare Ultimate.  IOBit Advanced...

View Article

Image may be NSFW.
Clik here to view.

Threat Source newsletter (July 8, 2021)

Newsletter compiled by Jon Munshaw.Good afternoon, Talos readers.   Just like everyone else in the security world, our week's been dominated by the Kaseya supply chain attack. We went live on pretty...

View Article

Image may be NSFW.
Clik here to view.

PrintNightmare: Here’s what you need to know and Talos’ coverage

Over the past several weeks, there's been a lot of discussion about a particular privilege escalation vulnerability in Windows affecting the print spooler, dubbed PrintNightmare. The vulnerability...

View Article


Image may be NSFW.
Clik here to view.

Talos Takes Ep. #60: Everything you need to know about the Kaseya situation

By Jon Munshaw. The latest episode of Talos Takes is available now. Download this episode and subscribe to Talos Takes using the buttons below, or visit the Talos Takes page. In this special "XL...

View Article

Image may be NSFW.
Clik here to view.

Threat Roundup for July 2 to July 9

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between July 2 and July 9. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this...

View Article


Image may be NSFW.
Clik here to view.

Microsoft Patch Tuesday for July 2021 — Snort rules and prominent...

By Jon Munshaw, with contributions from Jaeson Schultz.  Microsoft released its monthly security update Tuesday, disclosing 117 vulnerabilities across its suite of products, by far the most in a month...

View Article

Image may be NSFW.
Clik here to view.

Following the Money: Comparing cryptocurrency value to illicit mining activity

By Nick Biasini In the age of meme stocks, Robinhood and Elon Musk's tweets influencing the global economy, cryptocurrency mining has not seemed as fringe as it once did. Mining has been around as long...

View Article


Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Multiple vulnerabilities in Advantech R-SeeNet

The Talos vulnerability research team discovered these vulnerabilities. Blog by Jon Munshaw.  Cisco Talos recently discovered multiple vulnerabilities in the Advantech R-SeeNet monitoring software....

View Article

Image may be NSFW.
Clik here to view.

Threat Source newsletter (July 15, 2021)

Newsletter compiled by Jon Munshaw.Good afternoon, Talos readers.   The value of cryptocurrency is all over the place. Elon Musk's tweets can send Dogecoin rising and falling. And Monero, the most...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Multiple vulnerabilities in D-LINK DIR-3040

Dave McDaniel discovered these vulnerabilities. Blog by Jon Munshaw.  Cisco Talos recently discovered multiple vulnerabilities in the D-LINK DIR-3040 wireless router.  The DIR-3040 is an AC3000-based...

View Article
Browsing all 1948 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>