Quantcast
Channel: Cisco Talos Blog
Browsing all 2052 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Threat Roundup for August 14 to August 21

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 14 and Aug. 21. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...

View Article


Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Use-after-free vulnerability in Google Chrome WebGL...

Marcin Towalski of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. The Google Chrome web browser contains a use-after-free vulnerability in its WebGL component that could allow a user...

View Article


Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Remote code execution, privilege escalation bugs in...

Claudio Bozzato, Lilith >_> and Dave McDaniel of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. Cisco Talos researchers recently discovered multiple vulnerabilities in...

View Article

Image may be NSFW.
Clik here to view.

What to expect when you're electing: The building blocks of disinformation...

By Nick Biasini, Kendall McKay and Matt Valites. As Cisco Talos discovered during our four-year investigation into election security, securing elections is an extremely difficult, complex task. In the...

View Article

Image may be NSFW.
Clik here to view.

Threat Source newsletter for Aug. 27, 2020

Newsletter compiled by Jon Munshaw. Good afternoon, Talos readers.  As part of our continued look at election security ahead of the November election, we have another research paper out this week. This...

View Article


Image may be NSFW.
Clik here to view.

Threat Roundup for August 21 to August 27

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 21 and Aug. 27. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Multiple SQL, code injection vulnerabilities in OpenSIS

Yuri Kramarz and Yves Younan discovered these vulnerabilities. Blog by Jon Munshaw Cisco Talos researchers recently discovered multiple vulnerabilities in the OpenSIS software family. OpenSIS is a...

View Article

Image may be NSFW.
Clik here to view.

Quarterly Report: Incident Response trends in Summer 2020

By David Liebenberg and Caitlin Huey. For the fifth quarter in a row, Cisco Talos Incident Response (CTIR) observed ransomware dominating the threat landscape. Infections involved a wide variety of...

View Article


Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Code execution, memory corruption vulnerabilities in...

 Emmanuel Tacheau of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. Cisco Talos recently discovered two vulnerabilities in Accusoft ImageGear. The ImageGear library is a...

View Article


Image may be NSFW.
Clik here to view.

Beers with Talos ep. #91: Get the FUD out

Beers with Talos (BWT) Podcast episode No. 91 is now available. Download this episode and subscribe to Beers with Talos:Apple Podcasts Google PodcastsSpotify   StitcherIf iTunes and Google Play aren't...

View Article

Image may be NSFW.
Clik here to view.

Better email classification, courtesy of you

Cisco customers with Email Security Appliances (ESA) or Cloud Email Security (CES) accounts already know the benefits of Cisco’s email filtering. Every day, millions of malicious emails are...

View Article

Image may be NSFW.
Clik here to view.

Salfram: Robbing the place without removing your name tag

By Holger Unterbrink and Edmund Brumaghin.  Threat summary Cisco Talos recently uncovered a series of email campaigns utilizing links to malicious documents hosted on legitimate file-sharing platforms...

View Article

Image may be NSFW.
Clik here to view.

Threat Source newsletter for Sept. 3, 2020

 Newsletter compiled by Jon Munshaw. Good afternoon, Talos readers.  We recently uncovered a series of email campaigns utilizing links to malicious documents hosted on legitimate file-sharing platforms...

View Article


Image may be NSFW.
Clik here to view.

Threat Roundup for August 28 to September 4

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 28 and Sept. 4. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Privilege escalation in Windows 10 CLFS driver

Marcin “Icewall” Noga of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. Cisco Talos recently discovered a privilege escalation vulnerability in the Windows 10 Common Log File System....

View Article


Image may be NSFW.
Clik here to view.

Microsoft Patch Tuesday for Sept. 2020 — Snort rules and prominent...

By Jon Munshaw.  Microsoft released its monthly security update Tuesday, disclosing more than 120 vulnerabilities across its array of products.  Twenty-three of the vulnerabilities are considered...

View Article

Image may be NSFW.
Clik here to view.

Roundtable video: Disinformation and election security

By Jon Munshaw. In our continued coverage of election security, we decided to sit down with four Talos and Cisco researchers to discuss disinformation. As we outlined in our recent research paper,...

View Article


Image may be NSFW.
Clik here to view.

Threat Source newsletter for Sept. 10, 2020

  Newsletter compiled by Jon Munshaw. Good afternoon, Talos readers.  In our continued research on election security, we have a new video roundtable discussion up on our YouTube page. In this...

View Article

Image may be NSFW.
Clik here to view.

Threat Roundup for September 4 to September 11

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Sept. 4 and Sept. 11. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Memory corruption in Google PDFium

Aleksandar Nikolic of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. Google Chrome's PDFium feature could be exploited by an adversary to corrupt memory and potentially execute...

View Article
Browsing all 2052 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>