War Games: A WOPR of a Security Test (Part 2)
Having defined the scenarios, you can see how these could be linked together in different ways to form comprehensive attack vectors.
Having defined the scenarios, you can see how these could be linked together in different ways to form comprehensive attack vectors.
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between Oct. 19 and 26....
Piotr Bania, Cory Duplantis and Martin Zeiser of Cisco Talos discovered this vulnerability. Today, Cisco Talos is disclosing a vulnerability that we identified in the MKVToolNix mkvinfo utility that parses...
Do you remember the movie “Die Hard”? Arguably the best Christmas movie ever. All kidding aside, this movie has a great correlation into Security best practices.
Overview Cisco Talos is disclosing two vulnerabilities in Sophos HitmanPro.Alert, a malware detection and protection tool. Both vulnerabilities lie in the input/output control (IOCTL) message handler. One could allow an...
It is no secret that the proliferation of connected devices and sensors has introduced new and growing security challenges across every industry and enterprise.
When a security incident occurs, it is unlikely that the entire scope and chain of events will be obvious from the outset.
In what was an interesting change to the usual technical and risk/compliance focused consultancy, the Team carried out a War Games exercise - similar to a "Red Team" engagement.
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between Oct. 12 and 19....
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Explore our Products & Services