Threat Roundup for January 14 to January 21
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Jan. 14 and Jan. 21. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleUkraine Campaign Delivers Defacement and Wipers, in Continued Escalation
Authored by Nick Biasini and Chris Neal with Contributions from Dmytro Korzhevin. Several cyber attacks against Ukrainian government websites — including website defacements and destructive wiper...
View ArticleTalos Incident Response year-in-review for 2021
By David Liebenberg. Cisco Talos Incident Response (CTIR), as with everyone else in the cybersecurity world, dealt with a bevy of threats last year, as responders dealt with an expanding set of...
View ArticleVulnerability Spotlight: Vulnerability in Apple iOS, iPad OS and MacOS could...
Jaewon Min of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. Cisco Talos recently discovered an out-of-bounds read vulnerability in Apple’s macOS and iOS operating systems that...
View ArticleVulnerability Spotlight: WiFi-connected security camera could be manipulated...
Francesco Benvenuto of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. Cisco Talos recently discovered several vulnerabilities in the Reolink RLC-410W security camera that could...
View ArticleBeers with Talos, Ep. #115: Everybody's measured by quarters — even threat...
Beers with Talos (BWT) Podcast episode No. 115 is now available. Download this episode and subscribe to Beers with Talos: Apple Podcasts Google Podcasts Spotify StitcherRecorded Jan. 14, 2022. If...
View ArticleThreat Source Newsletter (Jan. 27, 2022)
Newsletter compiled by Jon Munshaw.Good afternoon, Talos readers. It's great to have New Year's resolutions and all. But we don't want you taking the wrong lessons away from 2021, either. Like just...
View ArticleThreat Roundup for January 21 to January 28
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Jan. 21 and Jan. 28. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleVulnerability Spotlight: Memory corruption and use-after-free vulnerabilities...
Aleksandar Nikolic of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. Cisco Talos recently discovered a memory corruption and use-after-free vulnerability in the Foxit PDF Reader....
View ArticleIranian APT MuddyWater targets Turkish users via malicious PDFs, executables
By Asheer Malhotra and Vitor Ventura. Cisco Talos has observed a new campaign targeting Turkish private organizations alongside governmental institutions. Talos attributes this campaign with high...
View ArticleVulnerability Spotlight: Multiple vulnerabilities in Sealevel SeaConnect
Francesco Benvenuto and Matt Wiseman of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. Cisco Talos recently discovered several vulnerabilities in Sealevel Systems Inc.’s SeaConnect...
View ArticleArid Viper APT targets Palestine with new wave of politically themed phishing...
By Asheer Malhotra and Vitor Ventura. Cisco Talos has observed a new wave of Delphi malware called Micropsia developed and operated by the Arid Viper APT group since 2017.This campaign targets...
View ArticleThreat Roundup for January 28 to February 4
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Jan. 28 and Feb. 4. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleVulnerability Spotlight: Use-after-free in Google Chrome could lead to code...
Marcin Towalski of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. Cisco Talos recently discovered an exploitable use-after-free vulnerability in Google Chrome. Google Chrome is a...
View ArticleMicrosoft Patch Tuesday for Feb. 2022 — Snort rules and prominent...
By Jon Munshaw and Chris Neal. Microsoft released its monthly security update Tuesday, disclosing 51 vulnerabilities across its large collection of hardware and software. None of the vulnerabilities...
View ArticleWhat’s with the shared VBA code between Transparent Tribe and other threat...
By Vanja Svajcer and Vitor Ventura. Recently, we've been researching several threat actors operating in South Asia: Transparent Tribe, SideCopy, etc., that deploy a range of remote access trojans...
View ArticleBeers with Talos, Ep. #116: Let's wade into the MuddyWater filled with Vipers
Beers with Talos (BWT) Podcast episode No. 116 is now available. Download this episode and subscribe to Beers with Talos: Apple Podcasts Google Podcasts Spotify StitcherRecorded Feb. 4, 2022. If...
View ArticleThreat Roundup for February 4 to February 11
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Feb. 4 and Feb. 11. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleVulnerability Spotlight: Vulnerabilities in Moxa MXView could allow attacker...
Patrick DeSantis of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. Cisco Talos recently discovered two vulnerabilities in Moxa's MXview network management software that could allow...
View ArticleVulnerability Spotlight: Vulnerability in Hancom Office could lead to memory...
Marcin “Icewall” Noga of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. Cisco Talos recently discovered a vulnerability in Hancom Office — a popular software suite in South Korea —...
View Article