RSS Security

πŸ”’
❌ About FreshRSS
There are new articles available, click to refresh the page.
Today β€” 17 May 2021Cisco Talos

Case Study: Incident Response is a relationship-driven business

Proof that incident response is "the ultimate team sport"Β  By Brad Garnett.Β IntroductionΒ  As a seasoned incident responder, and now IR business leader here at Cisco Talos Incident Response (CTIR), I have always said that incident response is the ultimate team sport. People are...

[[ This is only the beginning! Please visit the blog for the complete entry ]]
Before yesterdayCisco Talos

Threat Roundup for May 7 to May 14

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between May 7 and May 14. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics,...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Talos Takes Ep. #53: The broader lesson of those air fryer vulnerabilities

By Jon Munshaw. The latest episode of Talos Takes is available now. Download this episode and subscribe to Talos Takes using the buttons below, or visit theΒ Talos Takes page. It seemed like everyone on security Twitter had a joke when we disclosed a vulnerability in a WiFi-connected air fryer....

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Threat Source Newsletter (May 13, 2021)

Β Β Newsletter compiled by Jon Munshaw. Good afternoon, Talos readers.Β Β  In case you missed the Friday news drop last week, we have an update on the Lemon Duck cryptocurrency miner. It's not as eye-catching as the ransomware attacks that make the news, but Lemon Duck's...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Transparent Tribe APT expands its Windows malware arsenal

13 May 2021 at 12:09
By Asheer Malhotra, Justin Thattil and Kendall McKay. Transparent Tribe, also known as APT36 and Mythic Leopard, continues to create fake domains mimicking legitimate military and defense organizations as a core component of their operations. Cisco Talos' previous research has mainly linked this...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Vulnerability Spotlight: Code execution vulnerability in Adobe Acrobat Reader

Aleksandar NikolicΒ of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.Β  Cisco Talos recently discovered an arbitrary code execution vulnerability in Adobe Acrobat Reader.Β Β  Adobe Acrobat Reader is one of the most popular and feature-rich PDF readers on the market....

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Microsoft Patch Tuesday for May 2021 β€” Snort rules and prominent vulnerabilities

By Jon Munshaw, with contributions from Chris Neal.Β  Microsoft released its monthly security update Tuesday, disclosing 55 vulnerabilities across its suite of products, the fewest in any month since January 2020.Β  There are only three critical vulnerabilities patched in this month, while...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Lemon Duck spreads its wings: Actors target Microsoft Exchange servers, incorporate new TTPs

By Caitlin Huey and Andrew Windsor with contributions from Edmund Brumaghin. Lemon Duck continues to refine and improve upon their tactics, techniques and procedures as they attempt to maximize the effectiveness of their campaigns.Lemon Duck remains relevant as the operators begin to target...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Threat Roundup for April 30 to May 7

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between April 30 and May 7. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics,...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Talos Takes Ep. #52: Celebrating World Password Day by talking about getting rid of passwords

By Jon Munshaw. The latest episode of Talos Takes is available now. Download this episode and subscribe to Talos Takes using the buttons below, or visit theΒ Talos Takes page. The internet celebrated World Password Day on Thursday. To celebrate, we had Dave Lewis on the latest episode of Talos...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Threat Source Newsletter (May 6, 2021)

Β Newsletter compiled by Jon Munshaw. Good afternoon, Talos readers.Β Β  COVID-19 has changed everything about our lives β€” no surprise there. So it also shouldn't be shocking that it's changing the way Americans view Tax Day this year. The deadline to file taxes is about a month later...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Vulnerability Spotlight: Use-after-free vulnerability in Foxit PDF Reader

Aleksandar NikolicΒ of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.Β  Cisco Talos recently discovered a use-after-free vulnerability in the Foxit PDF Reader.Β Β  Foxit PDF Reader is one of the most popular PDF document readers currently available. As a complete...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Threat Roundup for April 23 to April 30

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between April 23 and April 30. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Talos Takes Ep. #51: COVID and Tax Day have perfectly aligned for spammers

By Jon Munshaw. The latest episode of Talos Takes is available now. Download this episode and subscribe to Talos Takes using the buttons below, or visit theΒ Talos Takes page. We see tax scams every year β€” people offering to do your taxes for you, finding a larger return, etc.Β  But this...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Threat Source Newsletter (April 29, 2021)

Β Newsletter compiled by Jon Munshaw. Good afternoon, Talos readers.Β Β  Ransomware is not just financial extortion. It is crime that transcends business, academic and geographic boundaries. Talos was proud to assist with a newly released report from the international Ransomware Task...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Vulnerability Spotlight: Information disclosure vulnerability in the Linux Kernel

Lilith >_> and Claudio Bozzato of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.Β  Cisco Talos recently discovered an information disclosure vulnerability in the Linux Kernel.Β Β  The Linux Kernel is the free and open-source core of Unix-like operating systems....

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Threat Roundup for April 16 to April 23

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between April 16 and April 23. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Talos Takes Ep. #50: Just like us, attackers are using Slack and Discord now more than ever

Β  By Jon Munshaw. The latest episode of Talos Takes is available now. Download this episode and subscribe to Talos Takes using the buttons below, or visit theΒ Talos Takes page. With more workers than ever going remote due to the COVID-19 pandemic, the popularity of collaboration apps like...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Threat Source Newsletter (April 22, 2021)

Newsletter compiled by Jon Munshaw. Good afternoon, Talos readers.Β Β  We went viral this week! Everyone seemed to love to joke about these vulnerabilities we discovered in a WiFi-connected air fryer. An attacker, if they had physical access to the device, could exploit these...

[[ This is only the beginning! Please visit the blog for the complete entry ]]
❌