Quantcast
Channel: Cisco Talos Blog
Browsing all 2026 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Talos Black Hat 2019 flash talk roundup

Talos went wall-to-wall at Hacker Summer Camp, showing up to Black Hat and DEFCON with talks, challenges, advice and education.Over the course of two days at Black Hat, Cisco Security hosted more than...

View Article


Image may be NSFW.
Clik here to view.

Threat Source newsletter (Aug. 15)

Newsletter compiled by Jon Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.Sorry we missed you last week, we were all...

View Article


Image may be NSFW.
Clik here to view.

Beers with Talos Ep. #59: The tardy episode

Beers with Talos (BWT) Podcast episode No. 59 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing, click here.Recorded 8/2/19 - Yes, I...

View Article

Image may be NSFW.
Clik here to view.

Threat Roundup for August 9 to August 16

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 9 and Aug. 16. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Multiple bugs in OpenWeave and Nest Labs Nest Cam IQ...

Lilith Wyatt and Claudio Bozzato of Cisco Talos discovered these vulnerabilities.Cisco Talos recently discovered multiple vulnerabilities in the Nest Cam IQ Indoor camera. One of Nest Labs’ most...

View Article


Image may be NSFW.
Clik here to view.

What you — and your company — should know about cyber insurance

By Jon Munshaw and Joe Marshall. It’s no longer a question of “if” any given company or organization is going to hit with a cyber attack — it’s when. And when that attack comes, who is willing to take...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Multiple vulnerabilities in Aspose APIs

Cory Duplantis and Aleksandar Nikolic of Cisco Talos discovered these vulnerabilities.Cisco Talos recently discovered multiple remote code execution vulnerabilities in various Aspose APIs. Aspose...

View Article

Image may be NSFW.
Clik here to view.

Talos DEFCON badge build instructions and use

By Patrick Mullen.We want to thank everyone who stopped by the Cisco Talos booth at DEFCON's Blue Team Village earlier this month. We handed out these badges at our area where we had Snort rules...

View Article


Image may be NSFW.
Clik here to view.

Article 1

New 4CAN tool helps identify vulnerabilities in on-board car computersBy Alex DeTrano, Jason Royes, and Matthew Valites.Executive summaryModern automobiles contain hundreds of sensors and mechanics...

View Article


Image may be NSFW.
Clik here to view.

Threat Source newsletter (Aug. 22)

Newsletter compiled by Jon Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.A lot of people may think that cyber...

View Article

Image may be NSFW.
Clik here to view.

Threat Roundup for August 16 to August 23

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 16 and Aug. 23. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...

View Article

Image may be NSFW.
Clik here to view.

China Chopper still active 9 years later

By Paul Rascagneres and Vanja Svajcer.IntroductionThreats will commonly fade away over time as they're discovered, reported on, and detected. But China Chopper has found a way to stay relevant, active...

View Article

Image may be NSFW.
Clik here to view.

RAT Ratatouille: Backdooring PCs with leaked RATs

By Edmund Brumaghin and Holger Unterbrink.Executive summaryOrcus RAT and RevengeRAT are two of the most popular remote access trojans (RATs) in use across the threat landscape. Since its emergence in...

View Article


Image may be NSFW.
Clik here to view.

Threat Source newsletter (Aug. 22)

Newsletter compiled by Jon Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.What’s old is new again.Our research this...

View Article

Image may be NSFW.
Clik here to view.

Beers with Talos Ep. #60: Summer camp flashbacks and defining your intel

Beers with Talos (BWT) Podcast episode No. 60 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing, click here.Recorded Aug. 16, 2019 —...

View Article


Image may be NSFW.
Clik here to view.

Threat Roundup for August 23 to August 30

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 23 and Aug. 30. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Two vulnerabilities in Epignosis eFront

Yuri Kramarz of Security Advisory Incident Response EMEAR discovered these vulnerabilities.Cisco Talos discovered two vulnerabilities in Epignosis eFront — one of which could allow an attacker to...

View Article


Image may be NSFW.
Clik here to view.

The latest on BlueKeep and DejaBlue vulnerabilities — Using Firepower to...

This blog was authored by Brandon Stultz, Holger Unterbrink and Edmund Brumaghin.Executive summaryOver the past few months, Microsoft has released several security updates for critical Remote Desktop...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Information disclosure vulnerability in Blynk-Library

Lilith Wyatt of Cisco Talos discovered this vulnerability.Cisco Talos recently discovered an information disclosure vulnerability in Blynk-Library. Blynk-Library is a small library for connecting more...

View Article

Image may be NSFW.
Clik here to view.

GhIDA: Ghidra decompiler for IDA Pro

By Andrea MarcelliExecutive SummaryCisco Talos is releasing two new tools for IDA Pro: GhIDA and Ghidraaas.GhIDA is an IDA Pro plugin that integrates the Ghidra decompiler in the IDA workflow, giving...

View Article
Browsing all 2026 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>