Video: Talos 2023 Year in Review highlights
Cisco's Talos Intelligence Group Blog
by Hazel Burton
10h ago
In this video, experts from across Cisco Talos came together to discuss the 2023 Talos Year in Review. We chat about what’s new, what’s stayed the same, and how the geopolitical environment has affected the threat landscape. This video was recorded live on social media: Read the 2023 Cisco Talos Year in Review Download Now We also discussed Project PowerUp, the story of how Cisco helped to keep the lights on in Ukraine. Read the full story here ..read more
Visit website
Cybersecurity considerations to have when shopping for holiday gifts
Cisco's Talos Intelligence Group Blog
by Jonathan Munshaw
3d ago
As I wrote about last week, there are holiday shopping-related scams already popping up all over the place.   But another aspect of security that many shoppers don’t consider this time of year is the security of the products they’re buying, even through a legitimate online marketplace.  This is a glaring issue with home security cameras and Wi-Fi-connected doorbells, but I can’t imagine these are particularly popular holiday gifts. With virtually everything being connected to the internet somehow these days, everything is a potential security risk if you’re buying a new piece of tec ..read more
Visit website
Remote code execution vulnerabilities found in Buildroot, Foxit PDF Reader
Cisco's Talos Intelligence Group Blog
by Jonathan Munshaw
5d ago
Cisco Talos has disclosed 10 vulnerabilities over the past two weeks, including nine that exist in a popular online PDF reader that offers a browser plugin.  Attackers could exploit these vulnerabilities in the Foxit PDF Reader to carry out a variety of malicious actions, but most notably could gain the ability to execute arbitrary code on the targeted machine. Foxit aims to have feature parity with Adobe Acrobat Reader, the most popular PDF-reading software currently on the market. The company offers paid versions of its software for a variety of users, including individuals and enterpr ..read more
Visit website
Beers with Talos episode 141: The TurkeyLurkey Man wants YOU to read Talos' Year in Review report
Cisco's Talos Intelligence Group Blog
by Mitch Neff
6d ago
In this episode the Beers with Talos team, led by special guest Dave Liebenberg, set out to save Thanksgiving. The TurkeyLurkey man is the hero that everybody needs, but perhaps don't deserve. For fans and opposers of Dave's Ranksgiving list, you'll be pleased to know he's back with a whole new order, and some new snackable entrants. Oh, and if it's security content you're after, we have some! Our 2023 Year in Review is out now, and the team recaps the top malware and attacker trends from the year. We also discussed the recent CNN article and Talos blog on our work to protect Ukraine's p ..read more
Visit website
$19 Stanely cups, fake Amazon Prime memberships all part of holiday shopping scams circulating
Cisco's Talos Intelligence Group Blog
by Jonathan Munshaw
1w ago
I know I’m a little late to the party to hit the prime SEO for Black Friday, Cyber Monday and holiday shopping. But if I know the readers of this newsletter, everyone is far from done with their holiday shopping already after a few days.  I also know I’m far from the only person to warn consumers about scams during this season, so I’m trying to split the difference and highlight a few specific scams and spam campaigns that are already circulating in the wild, some of which popped up right on Black Friday, so you don’t get caught in the remaining days leading up to the winter holidays.&nb ..read more
Visit website
New SugarGh0st RAT targets Uzbekistan government and South Korea
Cisco's Talos Intelligence Group Blog
by Ashley Shen
1w ago
Cisco Talos recently discovered a malicious campaign that likely started as early as August 2023, delivering a new remote access trojan (RAT) we dubbed “SugarGh0st.”  We found evidence suggesting the threat actor is targeting the Uzbekistan Ministry of Foreign Affairs and users in South Korea.  We assess with high confidence that the SugarGh0st RAT is a new customized variant of Gh0st RAT, an infamous trojan that’s been active for more than a decade, with customized commands to facilitate the remote administration tasks as directed by the C2 and modified communication protocol based ..read more
Visit website
What is threat hunting?
Cisco's Talos Intelligence Group Blog
by Hazel Burton
1w ago
Many organizations are curious about the idea of threat hunting, but what does this really entail?   What should you be hunting for? And what do you need to put in place to threat hunt properly?  Four experienced security professionals from across Cisco recently sat down to discuss the basics of threat hunting, and how to go about “searching for the unknown.” In this video, we cover:  The core principles of threat hunting.  What are attackers looking for? And therefore, what should defenders be putting in place?  Stories and experiences of threat hunting.  ..read more
Visit website
Vulnerabilities in Adobe Acrobat, Microsoft Excel could lead to arbitrary code execution
Cisco's Talos Intelligence Group Blog
by Jonathan Munshaw
2w ago
Cisco Talos’ Vulnerability Research team recently worked with Adobe and Microsoft to patch multiple vulnerabilities in the Acrobat and Excel software, respectively, that could lead to arbitrary code execution.  Talos also disclosed six vulnerabilities in the Weston Embedded µC-HTTP HTTP server implementation, some of which could also lead to code execution.  For Snort coverage that can detect the exploitation of these vulnerabilities, download the latest rule sets from Snort.org, and our latest Vulnerability Advisories are always posted on Talos Intelligence’s website.   A ..read more
Visit website
A deep dive into Phobos ransomware, recently deployed by 8Base group
Cisco's Talos Intelligence Group Blog
by Guilherme Venere
3w ago
Cisco Talos has recently observed an increase in activity conducted by 8Base, a ransomware group that uses a variant of the Phobos ransomware and other publicly available tools to facilitate their operations.  Most of the group’s Phobos variants are distributed by SmokeLoader, a backdoor trojan. This commodity loader typically drops or downloads additional payloads when deployed. In 8Base campaigns, however, it has the ransomware component embedded in its encrypted payloads, which is then decrypted and loaded into the SmokeLoader process’ memory. 8Base’s Phobos ransomware payload contain ..read more
Visit website
Understanding the Phobos affiliate structure and activity
Cisco's Talos Intelligence Group Blog
by Guilherme Venere
3w ago
Cisco Talos recently identified the most prolific Phobos variants, common affiliate tactics, techniques and procedures (TTPs), and characteristics of the Phobos affiliate structure, based on observed Phobos activity and analysis of over 1,000 Phobos samples from VirusTotal dating back to 2019. We assess with moderate confidence Eking, Eight, Elbie, Devos and Faust are the most common Phobos variants, as they appeared most frequently across the samples we analyzed.  The affiliates use similar TTPs to deploy Phobos and commonly target high-value servers, likely to pressure victims into pay ..read more
Visit website

Follow Cisco's Talos Intelligence Group Blog on FeedSpot

Continue with Google
Continue with Apple
OR