Articles
Cyber Security Skills That Prepared Me for the London Marathon
3 min read
Talos Strategic Planning & Communications EMEA Lead Martin L. breaks down cyber security skills that prepared him for training for and running the London Marathon.
Undersea Cables and Cyber Physical Risks.
3 min read
Consider how disruption to submarine cables might adversely affect the security requirements and availability of your network connections.
Cyber Insurance and the Attribution Conundrum
5 min read
Claiming on cyber insurance policies is soon to depend on attack attribution. What does this mean for CISOs and insurers?
Emerging trends from a year of cybersecurity threats
5 min read
What are the emerging trends in cybercrime based on the threats of the past year? Martin Lee identifies supply chain, cryptomining and biometrics as key issues that deserve our attention.
Shellshock Exploits in the Wild
2 min read
This post was authored by Joel Esler & Martin Lee. The recently discovered Bash vulnerability (CVE-2014-6271) potentially allows attackers to execute code on vulnerable systems. We have already blogged about the issue and provided more technical detail in a further blog. The rapid release of IPS signatures for our platforms allowed us to follow very […]
Another Major Vulnerability Bashes Systems
2 min read
Vulnerabilities that permit remote network attacks against ubiquitous software components are the nightmares of security professionals. On 24 September the presence of a new vulnerability, CVE-2014-6271 in Bash shell allowing remote code execution was disclosed.
Old and Persistent Malware
2 min read
Malware can find its way into the most unexpected of places. Certainly, no website can be assumed to be always completely free of malware. Typically, there are many ways that websites can be compromised to serve malware:
A Collection of Cryptographic Vulnerabilities.
2 min read
The rustic origins of the English language are evident in the words left to us by our agricultural ancestors. Many words developed to distinguish groups of different animals, presumably to indicate their relevant importance. A ‘flock’ of sheep was more valuable than a single sheep, a ‘pack’ of wolves posed more danger than a single […]
IE Zero Day and VGX.dll
2 min read
Update 5-1-2014: We can confirm Cisco customers have been targets of this attack. For the latest coverage information and additional details see our new post on the VRT blog. The recent discovery of a new Internet Explorer zero-day exploit underlines how exposed web browsers are to vulnerabilities for which a patch is yet to be released. Cisco is […]