Martin Lee

EMEA Lead, Strategic Planning & Communications

Cisco Talos

A licenced Chartered Engineer and EMEA lead within Talos, the threat intelligence and threat response group of Cisco. Author of "Cyber Threat Intelligence", a comprehensive text book on the subject. Please visit my author profile.


May 16, 2023


Cyber Security Skills That Prepared Me for the London Marathon

Talos Strategic Planning & Communications EMEA Lead Martin L. breaks down cyber security skills that prepared him for training for and running the London Marathon.

November 18, 2022


Undersea Cables and Cyber Physical Risks.

Consider how disruption to submarine cables might adversely affect the security requirements and availability of your network connections.

September 27, 2022


Cyber Insurance and the Attribution Conundrum

Claiming on cyber insurance policies is soon to depend on attack attribution. What does this mean for CISOs and insurers?

October 6, 2021


Emerging trends from a year of cybersecurity threats

What are the emerging trends in cybercrime based on the threats of the past year? Martin Lee identifies supply chain, cryptomining and biometrics as key issues that deserve our attention.

September 30, 2014


Shellshock Exploits in the Wild

This post was authored by Joel Esler & Martin Lee. The recently discovered Bash vulnerability (CVE-2014-6271) potentially allows attackers to execute code on vulnerable systems. We have already blogged about the issue and provided more technical detail in a further blog. The rapid release of IPS signatures for our platforms allowed us to follow very […]

September 25, 2014


Another Major Vulnerability Bashes Systems

Vulnerabilities that permit remote network attacks against ubiquitous software components are the nightmares of security professionals. On 24 September the presence of a new vulnerability, CVE-2014-6271 in Bash shell allowing remote code execution was disclosed.

July 21, 2014


Old and Persistent Malware

Malware can find its way into the most unexpected of places. Certainly, no website can be assumed to be always completely free of malware. Typically, there are many ways that websites can be compromised to serve malware:

June 6, 2014


A Collection of Cryptographic Vulnerabilities.

The rustic origins of the English language are evident in the words left to us by our agricultural ancestors. Many words developed to distinguish groups of different animals, presumably to indicate their relevant importance. A ‘flock’ of sheep was more valuable than a single sheep, a ‘pack’ of wolves posed more danger than a single […]

April 28, 2014


IE Zero Day and VGX.dll

Update 5-1-2014: We can confirm Cisco customers have been targets of this attack. For the latest coverage information and additional details see our new post on the VRT blog.  The recent discovery of a new Internet Explorer zero-day exploit underlines how exposed web browsers are to vulnerabilities for which a patch is yet to be released. Cisco is […]