Quantcast
Channel: Cisco Talos Blog
Browsing all 2026 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Cisco Talos helps CISOs get back to basics with advisory series

At Cisco Talos, we try to build detections for every threat we see to provide customers with a portfolio capable of identifying and stopping threats at various stages of an attack's lifecycle....

View Article


Image may be NSFW.
Clik here to view.

Threat Source newsletter (Oct. 24, 2019)

Newsletter compiled by Jon Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.Never assume that a malware family is...

View Article


Image may be NSFW.
Clik here to view.

Beers with Talos Ep. #64: Your problem isn’t complex, it's simply complexity

By Mitch NeffBeers with Talos (BWT) Podcast episode No. 64 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing, click here.Recorded...

View Article

Image may be NSFW.
Clik here to view.

Threat Roundup for October 18 to October 25

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct. 18 and Oct. 25. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Denial-of-service in VMWare Fusion 11

Piotr Bania of Cisco Talos discovered this vulnerability.Executive summaryVMware Fusion 15 contains an exploitable denial-of-service vulnerability. VMWare Fusion is an application for Mac operating...

View Article


Image may be NSFW.
Clik here to view.

The commoditization of mobile espionage software

By Matthew Valites with contributions by Joanne Kim and Edmund BrumaghinExecutive summaryMobile stalkerware has all sorts of wide-ranging consequences. The creators of these types of apps can track...

View Article

Image may be NSFW.
Clik here to view.

CISO Advisory: Security Architecture

Security architecture and design is a vital function of a healthy enterprise. This function is fundamentally, about understanding IT architecture relationships, and ensuring security is a vital element...

View Article

Image may be NSFW.
Clik here to view.

Threat Source newsletter (Oct. 31, 2019)

Newsletter compiled by Jon Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.We’re scared of stalkerware, and you...

View Article


Image may be NSFW.
Clik here to view.

Threat Roundup for October 25 to November 1

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct. 25 and Nov. 1. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...

View Article


Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Two remote code execution vulnerabilities in...

Piotr Bania of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.Cisco Talos recently discovered two remote code execution vulnerabilities in Investintech’s Able2Extract Professional. This...

View Article

Image may be NSFW.
Clik here to view.

The latest on BlueKeep and DejaBlue vulnerabilities — Using Firepower to...

Update (11/04/2019):There have been several public reports of active exploitation of CVE-2019-0708, commonly referred to as “BlueKeep.” Preliminary reports indicate that the vulnerability is being...

View Article

Image may be NSFW.
Clik here to view.

C2 With It All: From Ransomware To Carding

By Warren Mercer, Paul Rascagneres and Vitor Ventura.SummaryCisco Talos recently discovered a new server hosting a large stockpile of malicious files. Our analysis of these files shows that these...

View Article

Image may be NSFW.
Clik here to view.

CISO Advisory: Security Architecture

Security architecture and design is a vital function of a healthy enterprise. This function is fundamentally, about understanding IT architecture relationships, and ensuring security is a vital element...

View Article


Image may be NSFW.
Clik here to view.

How adversaries use politics for compromise

By Nick Biasini and Edmund Brumaghin.Executive SummaryWith the U.S. presidential primaries just around the corner, even malware authors can't help but get behind the frenzy. Cisco Talos recently...

View Article

Image may be NSFW.
Clik here to view.

Beers with Talos Ep. #65: Please welcome to the show… Talos Incident Response

By Mitch Neff.Beers with Talos (BWT) Podcast episode No. 65 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing, click here.Recorded...

View Article


Image may be NSFW.
Clik here to view.

Talos, Cisco Incident Response team up to offer more protection than ever

By Sean MasonOver the years, I've had the honor and privilege to work within some of the greatest security teams on the planet, working alongside such passionate and talented people at Cisco makes...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Code execution vulnerabilities in LEADTOOLS

Marcin Towalski and Cory Duplantis of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.Cisco Talos recently discovered multiple vulnerabilities in the LEADTOOLS line of imaging...

View Article


Image may be NSFW.
Clik here to view.

Threat Source newsletter (Oct. 31, 2019)

Newsletter compiled by Jon Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.The only news we’re going to cover this...

View Article

Image may be NSFW.
Clik here to view.

Threat Roundup for November 1 to November 8

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Nov. 1 and Nov. 8. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this...

View Article

Image may be NSFW.
Clik here to view.

New partnership brings together Talos’ visibility with IR’s unmatched...

By Jon Munshaw.The threat landscape has evolved into a complex, challenging environment for organizations everywhere. A talent shortage, combined with an increase in incidents, has led to a generally...

View Article
Browsing all 2026 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>