Talos Black Hat 2019 flash talk roundup
Talos went wall-to-wall at Hacker Summer Camp, showing up to Black Hat and DEFCON with talks, challenges, advice and education.Over the course of two days at Black Hat, Cisco Security hosted more than...
View ArticleThreat Source newsletter (Aug. 15)
Newsletter compiled by Jon Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.Sorry we missed you last week, we were all...
View ArticleBeers with Talos Ep. #59: The tardy episode
Beers with Talos (BWT) Podcast episode No. 59 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing, click here.Recorded 8/2/19 - Yes, I...
View ArticleThreat Roundup for August 9 to August 16
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 9 and Aug. 16. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleVulnerability Spotlight: Multiple bugs in OpenWeave and Nest Labs Nest Cam IQ...
Lilith Wyatt and Claudio Bozzato of Cisco Talos discovered these vulnerabilities.Cisco Talos recently discovered multiple vulnerabilities in the Nest Cam IQ Indoor camera. One of Nest Labs’ most...
View ArticleWhat you — and your company — should know about cyber insurance
By Jon Munshaw and Joe Marshall. It’s no longer a question of “if” any given company or organization is going to hit with a cyber attack — it’s when. And when that attack comes, who is willing to take...
View ArticleVulnerability Spotlight: Multiple vulnerabilities in Aspose APIs
Cory Duplantis and Aleksandar Nikolic of Cisco Talos discovered these vulnerabilities.Cisco Talos recently discovered multiple remote code execution vulnerabilities in various Aspose APIs. Aspose...
View ArticleTalos DEFCON badge build instructions and use
By Patrick Mullen.We want to thank everyone who stopped by the Cisco Talos booth at DEFCON's Blue Team Village earlier this month. We handed out these badges at our area where we had Snort rules...
View ArticleArticle 1
New 4CAN tool helps identify vulnerabilities in on-board car computersBy Alex DeTrano, Jason Royes, and Matthew Valites.Executive summaryModern automobiles contain hundreds of sensors and mechanics...
View ArticleThreat Source newsletter (Aug. 22)
Newsletter compiled by Jon Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.A lot of people may think that cyber...
View ArticleThreat Roundup for August 16 to August 23
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 16 and Aug. 23. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleChina Chopper still active 9 years later
By Paul Rascagneres and Vanja Svajcer.IntroductionThreats will commonly fade away over time as they're discovered, reported on, and detected. But China Chopper has found a way to stay relevant, active...
View ArticleRAT Ratatouille: Backdooring PCs with leaked RATs
By Edmund Brumaghin and Holger Unterbrink.Executive summaryOrcus RAT and RevengeRAT are two of the most popular remote access trojans (RATs) in use across the threat landscape. Since its emergence in...
View ArticleThreat Source newsletter (Aug. 22)
Newsletter compiled by Jon Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.What’s old is new again.Our research this...
View ArticleBeers with Talos Ep. #60: Summer camp flashbacks and defining your intel
Beers with Talos (BWT) Podcast episode No. 60 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing, click here.Recorded Aug. 16, 2019 —...
View ArticleThreat Roundup for August 23 to August 30
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 23 and Aug. 30. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleVulnerability Spotlight: Two vulnerabilities in Epignosis eFront
Yuri Kramarz of Security Advisory Incident Response EMEAR discovered these vulnerabilities.Cisco Talos discovered two vulnerabilities in Epignosis eFront — one of which could allow an attacker to...
View ArticleThe latest on BlueKeep and DejaBlue vulnerabilities — Using Firepower to...
This blog was authored by Brandon Stultz, Holger Unterbrink and Edmund Brumaghin.Executive summaryOver the past few months, Microsoft has released several security updates for critical Remote Desktop...
View ArticleVulnerability Spotlight: Information disclosure vulnerability in Blynk-Library
Lilith Wyatt of Cisco Talos discovered this vulnerability.Cisco Talos recently discovered an information disclosure vulnerability in Blynk-Library. Blynk-Library is a small library for connecting more...
View ArticleGhIDA: Ghidra decompiler for IDA Pro
By Andrea MarcelliExecutive SummaryCisco Talos is releasing two new tools for IDA Pro: GhIDA and Ghidraaas.GhIDA is an IDA Pro plugin that integrates the Ghidra decompiler in the IDA workflow, giving...
View Article