Talos

December 7, 2017

THREAT RESEARCH

The Mutiny Fuzzing Framework and Decept Proxy

This blog post is authored by James Spadaro of Cisco ASIG and Lilith Wyatt of Cisco Talos. Imagine a scenario where you, as a vulnerability researcher, are tasked with auditing a network application to identify vulnerabilities. By itself, the task may not seem too daunting until you learn of a coupl…

November 27, 2017

THREAT RESEARCH

ROKRAT Reloaded

This post was authored by Warren Mercer, Paul Rascagneres and with contributions from Jungsoo An. Earlier this year, Talos published 2 articles concerning South Korean threats. The first one was about the use of a malicious HWP document which dropped downloaders used to retrieve malicious payloads o…

November 22, 2017

THREAT RESEARCH

Talos Wins The 5th Volatility Plugin Contest With Pyrebox

Talos has won this year’s 5th Volatility plugin contest with Pyrebox. Volatility is a well-known open-source framework designed to analyse operating system memory. The framework exists since 2007, for the previous 5 years they have run a plugin contest to find the most innovative, interesting,…

November 20, 2017

THREAT RESEARCH

This Holiday Season – Buy One IoT Device, Get Free CVEs

As the Internet of Things gains steam and continues to develop, so are adversaries and the threats affecting these systems. Companies throughout the world are busy deploying low cost Internet-connected computing devices (aka the Internet of Things) to solve business problems and improve our lives. I…

November 17, 2017

THREAT RESEARCH

Threat Round Up for Nov 10 – Nov 17

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between November 10 and November 17. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key be…

November 8, 2017

TECHWISETV

Era of Intelligence – Cisco Live Cancun 2017

Here I am again at another Cisco Live! I’m pretty excited about this one, because I’m not hosting anything…I’m really just here to learn and spread some of that information to everyone else. If you’re interested in what Ruba Borno had to say, which technologies she made…

November 6, 2017

CUSTOMER EXPERIENCE

Prevention or Cure? Focusing your Cybersecurity Efforts and Investments

An ounce of prevention is worth a pound of cure, so the saying goes. When it comes to protecting your organization against the imminent threat of a cyber attack, it’s essential to factor in both. Here’s why. Today’s hackers are motivated and more organized than ever. This past year has shown how vul…

October 31, 2017

THREAT RESEARCH

Vulnerability Spotlight: The Circle of a Bug’s Life

Cisco Talos is disclosing several vulnerabilities identified in Circle with Disney. Circle with Disney is a network device designed to monitor the Internet use of children on a given network. Circle pairs wirelessly, with your home Wi-Fi and allows you to manage every device on the network, tablet,…

October 27, 2017

THREAT RESEARCH

Threat Round Up for Oct 20 – Oct 27

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between October 20 and October 27. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key beha…