Threat Roundup for December 13 to December 20
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Dec. 13 and Dec. 20. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleCisco ASA DoS bug attacked in wild
p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 10.0px Monaco; color: #161616; background-color: #ffffff} p.p2 {margin: 0.0px 0.0px 0.0px 0.0px; font: 10.0px Monaco; color: #161616; background-color:...
View ArticleVulnerability Spotlight: Two buffer overflow vulnerabilities in OpenCV
Dave McDaniel of Cisco Talos discovered these vulnerabilities.Cisco Talos recently discovered two buffer overflow vulnerabilities in the OpenCV libraries. An attacker could potentially exploit these...
View ArticleBeers with Talos Ep. #69: 2019 Threat Recap - RATs, Turtles, and Worms, Oh My!
By Mitch Neff.Beers with Talos (BWT) Podcast episode No. 69 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing, click here.Recorded...
View ArticleContinued Escalation of Tensions in the Middle East
Cisco Talos works with many organizations around the world, monitoring and protecting against sophisticated threats every day. As such, we are watching the current state of events in the Middle East...
View ArticleVulnerability Spotlight: Remote code execution vulnerability in E2fsprogs
Lilith [^_^] of Cisco Talos discovered this vulnerability.E2fsprogs contains an exploitable remote code execution vulnerability in its directory rehashing functionality. This set of programs is often...
View ArticleThreat Source newsletter (Jan. 9, 2019)
Newsletter compiled by Jon Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.We’re back after a long break for the...
View ArticleThreat Roundup for January 3 to January 10
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Jan. 3 and Jan. 10. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleNew Snort rules protect against recently discovered Citrix vulnerability
By Edmund Brumaghin, with contributions from Dalton Schaadt. Executive SummaryRecently, the details of a critical vulnerability affecting Citrix Application Delivery Controller and Citrix Gateway...
View ArticleMicrosoft Patch Tuesday — Jan. 2020: Vulnerability disclosures and Snort...
By Jon Munshaw.Microsoft released its monthly security update today, disclosing vulnerabilities across many of its products and releasing corresponding updates. This month's Patch Tuesday covers 49...
View ArticleStolen emails reflect Emotet's organic growth
By Jaeson SchultzIntroductionEmotet has a penchant for stealing a victim's email, then impersonating that victim and sending copies of itself in reply. The malicious emails are delivered through a...
View ArticleVulnerability Spotlight: Multiple remote code execution vulnerabilities in...
Aleksandar Nikolic of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.Cisco Talos recently discovered four remote code execution vulnerabilities in Foxit PDF Reader. Foxit PDF Reader...
View ArticleBeers with Talos Ep. #70: Semper Vigilantes - Strategic Defense in a Cyber...
By Mitch Neff.Beers with Talos (BWT) Podcast episode No. 70 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing, click here.Recorded...
View ArticleThreat Source newsletter (Jan. 26, 2019)
Newsletter compiled by Jon Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.This wasn’t your average Patch Tuesday....
View ArticleJhoneRAT: Cloud based python RAT targeting Middle Eastern countries
By Warren Mercer, Paul Rascagneres and Vitor Ventura with contributions from Eric Kuhla.Updated January 17th: the documents do not exploit the CVE-2017-0199 vulnerability. Executive SummaryToday, Cisco...
View ArticleThreat Roundup for January 10 to January 17
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Jan. 10 and Jan. 17. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleVulnerability Spotlight: Bitdefender BOX 2 bootstrap remote code execution...
Claudio Bozzato, Lilith Wyatt and Dave McDaniel of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.The Bitdefender BOX 2 contains two remote code execution vulnerabilities in its...
View ArticleBreaking down a two-year run of Vivin’s cryptominers
News SummaryThere is another large-scale cryptomining attack from an actor we are tracking as "Vivin" that has been active since at least November 2017."Vivin" has consistently evolved over the past...
View ArticleVulnerability Spotlight: Multiple vulnerabilities in some AMD graphics cards
Piotr Bania of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.Multiple vulnerabilities exist in a driver associated with the AMD Radeon line of graphics cards. An attacker can...
View ArticleThreat Source newsletter (Jan. 23, 2020)
Newsletter compiled by Jon Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.Despite tensions starting to fizzle...
View Article