Avatar

Martin Lee

EMEA Lead, Strategic Planning & Communications

Cisco Talos

A licenced Chartered Engineer and EMEA lead within Talos, the threat intelligence and threat response group of Cisco. Author of "Cyber Threat Intelligence", a comprehensive text book on the subject. Please visit my author profile.

Articles

May 16, 2023

WE ARE CISCO

Cyber Security Skills That Prepared Me for the London Marathon

3 min read

Talos Strategic Planning & Communications EMEA Lead Martin L. breaks down cyber security skills that prepared him for training for and running the London Marathon.

November 18, 2022

SECURITY

Undersea Cables and Cyber Physical Risks.

3 min read

Consider how disruption to submarine cables might adversely affect the security requirements and availability of your network connections.

September 27, 2022

SECURITY

Cyber Insurance and the Attribution Conundrum

5 min read

Claiming on cyber insurance policies is soon to depend on attack attribution. What does this mean for CISOs and insurers?

October 6, 2021

SECURITY

Emerging trends from a year of cybersecurity threats

5 min read

What are the emerging trends in cybercrime based on the threats of the past year? Martin Lee identifies supply chain, cryptomining and biometrics as key issues that deserve our attention.

September 30, 2014

THREAT RESEARCH

Shellshock Exploits in the Wild

2 min read

This post was authored by Joel Esler & Martin Lee. The recently discovered Bash vulnerability (CVE-2014-6271) potentially allows attackers to execute code on vulnerable systems. We have already blogged about the issue and provided more technical detail in a further blog. The rapid release of IPS signatures for our platforms allowed us to follow very […]

September 25, 2014

THREAT RESEARCH

Another Major Vulnerability Bashes Systems

2 min read

Vulnerabilities that permit remote network attacks against ubiquitous software components are the nightmares of security professionals. On 24 September the presence of a new vulnerability, CVE-2014-6271 in Bash shell allowing remote code execution was disclosed.

July 21, 2014

SECURITY

Old and Persistent Malware

2 min read

Malware can find its way into the most unexpected of places. Certainly, no website can be assumed to be always completely free of malware. Typically, there are many ways that websites can be compromised to serve malware:

June 6, 2014

SECURITY

A Collection of Cryptographic Vulnerabilities.

2 min read

The rustic origins of the English language are evident in the words left to us by our agricultural ancestors. Many words developed to distinguish groups of different animals, presumably to indicate their relevant importance. A ‘flock’ of sheep was more valuable than a single sheep, a ‘pack’ of wolves posed more danger than a single […]

April 28, 2014

SECURITY

IE Zero Day and VGX.dll

2 min read

Update 5-1-2014: We can confirm Cisco customers have been targets of this attack. For the latest coverage information and additional details see our new post on the VRT blog.  The recent discovery of a new Internet Explorer zero-day exploit underlines how exposed web browsers are to vulnerabilities for which a patch is yet to be released. Cisco is […]