Threat Roundup for August 3-10
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between Aug. 3 - 10. As with previous roundups, this post isn’t...
View ArticleMicrosoft Tuesday August 2018
p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 10.0px Monaco; color: #000000; background-color: #ffffff} p.p2 {margin: 0.0px 0.0px 0.0px 0.0px; font: 10.0px Monaco; color: #000000; background-color:...
View ArticleBeers with Talos EP 35: Live from the RiRa at Black Hat
Beers with Talos (BWT) Podcast Ep. #35 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing: www.talosintelligence.com/podcast.Ep. #35...
View ArticleThreat Roundup for August 10-17
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between August 10 and August 17. As with previous round-ups, this post isn't meant to be an in-depth analysis....
View ArticlePicking Apart Remcos Botnet-In-A-Box
This blog post was authored by Edmund Brumaghin and Holger Unterbrink with contributions fromEric Kuhla and Lilia Gonzalez Medina.OverviewCisco Talos has recently observed multiple campaigns using the...
View ArticleThreat Roundup for August 17-24
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between Aug. 17 and 24. As with previous roundups, this post...
View ArticleRocke: The Champion of Monero Miners
This post was authored by David Liebenberg. SummaryCryptocurrency miners are becoming an increasingly significant part of the threat landscape. These malicious miners steal CPU cycles from compromised...
View ArticleBeers with Talos EP 36: There Are Few Shades in the Grey Market
Beers with Talos (BWT) Podcast Ep. #36 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing: www.talosintelligence.com/podcast.Ep. #36...
View ArticleThreat Roundup for August 24-31
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between Aug. 24 and 31. As with previous roundups, this post...
View ArticleMalicious MDM: Let's Hide This App
This blog post is authored byWarren Mercer and Paul Rascagneres with contributions from Nick BiasiniSummarySince our initial discovery of a malicious mobile device management (MDM) platform that was...
View ArticleVulnerability Spotlight: TALOS-2018-0560 - ERPNext SQL Injection Vulnerabilities
Vulnerabilities discovered by Yuri Kramar from the Cisco Security Advisor TeamOverviewTalos is disclosing multiple SQL injection vulnerabilities in the Frappe ERPNext Version 10.1.6 application. Frappe...
View ArticleVulnerability Spotlight: CVE-2018-3952 / CVE-2018-4010 - Multi-provider VPN...
Discovered by Paul Rascagneres.OverviewCisco Talos has discovered two similar vulnerabilities in the ProtonVPN and NordVPN VPN clients. The vulnerabilities allow attackers to execute code as an...
View ArticleThreat Roundup for August 31 to September 7
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between Aug. 31 and Sept. 7. As with previous roundups, this post...
View ArticleMicrosoft Patch Tuesday - September 2018
Microsoft released its monthly set of security updates today for a variety of its products that address a variety of bugs. The latest Patch Tuesday covers 61 vulnerabilities, 17 of which are rated...
View ArticleSigAnalyzer: Signature analysis with CASC
Executive summaryClamAV Signature Creator (CASC) is an IDA Pro plugin that assists in the creation of ClamAV pattern signatures. We have enhanced this plugin to also analyze these signatures. The...
View ArticleThreat Roundup for September 7 to September 14
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between Sept. 7 and 14. As with previous roundups, this post...
View ArticleBeers with Talos EP 37: Snort 3 Beta Uses Multithreading. It’s Super Effective!
Beers with Talos (BWT) Podcast Ep. #37 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing: www.talosintelligence.com/podcast.Ep. #37...
View ArticleCyber Threat Alliance Releases Cryptomining Whitepaper
This post is authored by Ashlee Benge.Despite the recent devaluation of some cryptocurrencies, illicit cryptocurrency miners remain a lucrative and widespread attack vector in the threat landscape....
View ArticleThreat Roundup for September 14 to September 21
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between Sept. 14 and 21. As with previous roundups, this post...
View ArticleAdwind Dodges AV via DDE
This blog post is authored byPaul Rascagneres, Vitor Ventura and with the contribution of Tomislav Pericin and Robert Perica from ReversingLabs.IntroductionCisco Talos, along with fellow cybersecurity...
View Article