Articles
Malicious MDM: Let’s Hide This App
1 min read
Since our initial discovery of a malicious mobile device management (MDM) platform that was loading fake applications onto smartphones, we have gained greater insight into the attacker's methods. We now...
Threat Roundup for August 24-31
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between August 24 and August 31. As with previous round-ups, this post isn't meant to be an...
Rocke: The Champion of Monero Miners
1 min read
Cryptocurrency miners are becoming an increasingly significant part of the threat landscape.
Threat Roundup for August 17-24
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between August 17 and August 24. As with previous round-ups, this post isn't meant to be an...
Picking Apart Remcos Botnet-In-A-Box
1 min read
Cisco Talos has recently observed multiple campaigns using the Remcos remote access tool (RAT) that is offered for sale by a company called Breaking Security.
Threat Roundup for August 10-17
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between August 10 and August 17. As with previous round-ups, this post isn't meant to be an...
Microsoft Tuesday August 2018
1 min read
Microsoft released its monthly set of security advisories today for vulnerabilities that have been identified and addressed in various products. This month's advisory release addresses 62 new vulnerabilities, 20 of...
Threat Roundup for August 3-10
1 min read
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we've observed this week — covering the dates between August 3 and 10....
Playback: A TLS 1.3 Story
1 min read
Secure communications are one of the most important topics in information security and the Transport Layer Security (TLS) protocol is currently the most used protocol to provide secure communications on...
2