Quantcast
Channel: Cisco Talos Blog
Browsing all 2033 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Threat Roundup for March 15 to March 22

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between March 15 and March 22. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...

View Article


Image may be NSFW.
Clik here to view.

Cisco Talos adds new Content Category

Our goal at Cisco Talos is to provide detailed and actionable information in order to let customers decide how best to protect their networks and users based on their needs.To this end, Cisco Talos is...

View Article


Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Multiple vulnerabilities in GOG Galaxy Games

Richard Johnson and Tyler Bohan of Cisco Talos discovered these vulnerabilities.Executive summaryThe GOG Galaxy video game launcher contains multiple vulnerabilities that could allow a malicious actor...

View Article

Image may be NSFW.
Clik here to view.

Cyber Security Week in Review (March 28)

Welcome to this week's Cyber Security Week in Review, where Cisco Talos runs down all of the news we think you need to know in the security world.Top headlines this weekASUS had to release an emergency...

View Article

Image may be NSFW.
Clik here to view.

Threat Roundup for March 22 to March 29

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between March 22 and March 29. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...

View Article


Image may be NSFW.
Clik here to view.

Registration for the 2019 Talos Threat Research Summit is now open

The Talos Threat Research Summit is officially back.Registration is open now for the second year of our conference by defenders, for defenders. Tickets sold out quickly last year for our inaugural...

View Article

Image may be NSFW.
Clik here to view.

Threat Source (April 4)

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.If you haven’t yet, there’s still time to register for this year’s Talos...

View Article

Image may be NSFW.
Clik here to view.

Hiding in Plain Sight

This blog was written by Jon Munshaw and Jaeson Schultz.Cisco Talos is continually working to ensure that our threat intelligence not only accounts for the latest threats but also new versions of old...

View Article


Image may be NSFW.
Clik here to view.

Beers with Talos Ep. #50: Operating under the cover of… nothing

Beers with Talos (BWT) Podcast Ep. No. 50 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing, click here.Recorded March 29, 2019 -...

View Article


Image may be NSFW.
Clik here to view.

Threat Roundup for March 29 to April 5

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between March 29 and April 05. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Patch Tuesday — April 2019: Vulnerability disclosures and Snort...

Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 74 vulnerabilities, 16 of which are rated...

View Article

Image may be NSFW.
Clik here to view.

Gustuff banking botnet targets Australia

Vitor Ventura authored this post.Executive summaryCisco Talos has uncovered a new Android-based campaign targeting Australian financial institutions. As the investigation progressed, Talos came to...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Adobe Acrobat Reader remote code execution

Aleksandar Nikolic of Cisco Talos discovered these vulnerabilities.Executive summaryThere is a remote code execution vulnerability in Adobe Acrobat Reader that could occur if a user were to open a...

View Article


Image may be NSFW.
Clik here to view.

Sextortion profits decline despite higher volume, new techniques

Post authored by Nick Biasini and Jaeson Schultz.Sextortion spammers continue blasting away at high volume. The success they experienced with several high-profile campaigns last year has led these...

View Article

Image may be NSFW.
Clik here to view.

Threat Source (April 11)

Newsletter compiled by Jonathan Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.If you haven’t yet, there’s still...

View Article


Image may be NSFW.
Clik here to view.

Threat Roundup for April 5 to April 12

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between April 05 and April 12. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Multiple vulnerabilities in Shimo VPN's helper tool

Discovered by Tyler Bohan of Cisco Talos.OverviewCisco Talos is disclosing a series of vulnerabilities found in the Shimo VPN Helper Tool. Shimo VPN is a popular VPN client for MacOS that can be used...

View Article


Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Denial of service in VMWare Workstation 15

Piotr Bania of Cisco Talos discovered this vulnerability.Executive summaryVMware Workstation 15 contains an exploitable denial-of-service vulnerability. Workstation allows users to run multiple...

View Article

Image may be NSFW.
Clik here to view.

New HawkEye Reborn Variant Emerges Following Ownership Change

Edmund Brumaghin and Holger Unterbrink authored this blog post.Executive summaryMalware designed to steal sensitive information has been a threat to organizations around the world for a long time. The...

View Article

Image may be NSFW.
Clik here to view.

DNS Hijacking Abuses Trust In Core Internet Service

Authors: Danny Adamitis, David Maynor, Warren Mercer, Matthew Olney and Paul Rascagneres.PrefaceThis blog post discusses the technical details of a state-sponsored attack manipulating DNS systems....

View Article
Browsing all 2033 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>