Articles
Exploitable or Not Exploitable? Using REVEN to Examine a NULL Pointer Dereference.
1 min read
It can be very time-consuming to determine if a bug is exploitable or not. In this post, we’ll show how to decide if a vulnerability is exploitable by tracing back...
Multiple Cobalt Personality Disorder
1 min read
Despite the notion that modern cybersecurity protocols have stopped email-based attacks, email continues to be one of the primary attack vectors for malicious actors — both for widespread and targeted...
Threat Roundup for July 20-27
1 min read
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we've observed this week — covering the dates between July 20 and 27....
Vulnerability Spotlight: Multiple Vulnerabilities in Samsung SmartThings Hub
1 min read
These vulnerabilities were discovered by Claudio Bozzato of Cisco Talos. Cisco Talos recently discovered several vulnerabilities present within the firmware of the Samsung SmartThings Hub. In accordance with our coordinated...
Advanced Mobile Malware Campaign in India uses Malicious MDM – Part 2
1 min read
This blog post is authored by Warren Mercer and Paul Rascagneres and Andrew Williams. Summary Since our initial post on malicious mobile device management (MDM) platforms, we have gathered...
TalosIntelligence.com is rolling out a new dispute system
1 min read
At Cisco Talos, we need customers to be able to provide feedback at all times, whether it be about false positives, false negatives, or missed categories. Because we deal with...
Threat Roundup for July 13-20
1 min read
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we've observed this week — covering the dates between July 13 and 20....
Vulnerability Spotlight: Multiple Vulnerabilities in Sony IPELA E Series Camera
1 min read
Today, Cisco Talos is disclosing several vulnerabilities discovered with the Sony IPELA E Series Network Camera. Sony IPELA Cameras are network-facing cameras used for monitoring and surveillance. Read More...
Blocking Cryptocurrency Mining with Cisco Talos
1 min read
The value of cryptocurrencies has fluctuated wildly, but the value is still high enough to garner a lot of attention, both legitimate and malicious. Most of the malicious...