Cisco Talos helps CISOs get back to basics with advisory series
At Cisco Talos, we try to build detections for every threat we see to provide customers with a portfolio capable of identifying and stopping threats at various stages of an attack's lifecycle....
View ArticleThreat Source newsletter (Oct. 24, 2019)
Newsletter compiled by Jon Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.Never assume that a malware family is...
View ArticleBeers with Talos Ep. #64: Your problem isn’t complex, it's simply complexity
By Mitch NeffBeers with Talos (BWT) Podcast episode No. 64 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing, click here.Recorded...
View ArticleThreat Roundup for October 18 to October 25
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct. 18 and Oct. 25. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleVulnerability Spotlight: Denial-of-service in VMWare Fusion 11
Piotr Bania of Cisco Talos discovered this vulnerability.Executive summaryVMware Fusion 15 contains an exploitable denial-of-service vulnerability. VMWare Fusion is an application for Mac operating...
View ArticleThe commoditization of mobile espionage software
By Matthew Valites with contributions by Joanne Kim and Edmund BrumaghinExecutive summaryMobile stalkerware has all sorts of wide-ranging consequences. The creators of these types of apps can track...
View ArticleCISO Advisory: Security Architecture
Security architecture and design is a vital function of a healthy enterprise. This function is fundamentally, about understanding IT architecture relationships, and ensuring security is a vital element...
View ArticleThreat Source newsletter (Oct. 31, 2019)
Newsletter compiled by Jon Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.We’re scared of stalkerware, and you...
View ArticleThreat Roundup for October 25 to November 1
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct. 25 and Nov. 1. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleVulnerability Spotlight: Two remote code execution vulnerabilities in...
Piotr Bania of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.Cisco Talos recently discovered two remote code execution vulnerabilities in Investintech’s Able2Extract Professional. This...
View ArticleThe latest on BlueKeep and DejaBlue vulnerabilities — Using Firepower to...
Update (11/04/2019):There have been several public reports of active exploitation of CVE-2019-0708, commonly referred to as “BlueKeep.” Preliminary reports indicate that the vulnerability is being...
View ArticleC2 With It All: From Ransomware To Carding
By Warren Mercer, Paul Rascagneres and Vitor Ventura.SummaryCisco Talos recently discovered a new server hosting a large stockpile of malicious files. Our analysis of these files shows that these...
View ArticleCISO Advisory: Security Architecture
Security architecture and design is a vital function of a healthy enterprise. This function is fundamentally, about understanding IT architecture relationships, and ensuring security is a vital element...
View ArticleHow adversaries use politics for compromise
By Nick Biasini and Edmund Brumaghin.Executive SummaryWith the U.S. presidential primaries just around the corner, even malware authors can't help but get behind the frenzy. Cisco Talos recently...
View ArticleBeers with Talos Ep. #65: Please welcome to the show… Talos Incident Response
By Mitch Neff.Beers with Talos (BWT) Podcast episode No. 65 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing, click here.Recorded...
View ArticleTalos, Cisco Incident Response team up to offer more protection than ever
By Sean MasonOver the years, I've had the honor and privilege to work within some of the greatest security teams on the planet, working alongside such passionate and talented people at Cisco makes...
View ArticleVulnerability Spotlight: Code execution vulnerabilities in LEADTOOLS
Marcin Towalski and Cory Duplantis of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.Cisco Talos recently discovered multiple vulnerabilities in the LEADTOOLS line of imaging...
View ArticleThreat Source newsletter (Oct. 31, 2019)
Newsletter compiled by Jon Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.The only news we’re going to cover this...
View ArticleThreat Roundup for November 1 to November 8
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Nov. 1 and Nov. 8. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this...
View ArticleNew partnership brings together Talos’ visibility with IR’s unmatched...
By Jon Munshaw.The threat landscape has evolved into a complex, challenging environment for organizations everywhere. A talent shortage, combined with an increase in incidents, has led to a generally...
View Article