Talos
Delphi Used To Score Against Palestine
Executive Summary This blog was authored by Paul Rascagneres and Warren Mercer with contributions from Emmanuel Tacheau, Vanja Svajcer and Martin Lee. Talos continuously monitors malicious emails campaigns. We identified one specific spear phishing campaign launched against targets within Palestine,…
Threat Round-up for June 2- June 9
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between June 02 and June 09. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior c…
The Internet of Vulnerable Things
Technological progress is resulting in computing systems that are smaller, cheaper and consuming less power. These micro-computing systems are able to be integrated into everyday objects; when coupled with ubiquitous wireless connectivity these devices form the “Internet of Things”. The IoT has the…
Threat Round-up for May 19 – May 26
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between May 19 and May 26. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior cha…
File2pcap – The Talos Swiss Army Knife of Snort Rule Creation
This post was authored by Martin Zeiser with contributions by Joel Esler At Talos we are constantly on the lookout for threats to our customers networks, and part of the protection process is creating Snort rules for the latest vulnerabilities in order to detect any attacks. To improve your understa…
Cisco Coverage for Adylkuzz, Uiwix, and EternalRocks
When the WannaCry attack was launched a little over a week ago, it was one of the first large scale attacks leveraging the data that was leaked by the Shadow Brokers. At the time the real concern was how quickly we would begin to see other threats leverage the same vulnerabilities. Over the past cou…
Beers with Talos Podcast Now Available
The first episodes of Beers with Talos are now available on iTunes and directly on talosintelligence.com/podcasts. When Talos decided to make a threat intelligence podcast, we wanted to make it different than your typical buttoned down, subdued security podcast. The BWT crew: Craig, Joel, Nigel,…
Arbitrary Code Execution Vulnerabilities in MuPDF Identified and Patched
Talos is disclosing the presence of two vulnerabilities in the Artifex MuPDF renderer. MuPDF is a lightweight PDF parsing and rendering library featuring high fidelity graphics, high speed, and compact code size which makes it a fairly popular PDF library for embedding in different projects, especia…
WannaCry and Ransomware: How Manufacturers Can Reduce Risk
Friday, May 12 looked like a typical day for most folks as they went into work looking to finish off their day and head into the weekend. But as the day progressed, many organizations across the globe quickly realized that their TGIF was going to be spent dealing with a ransomware attack known as Wa…