Talos Threat Round Up for April 06-13
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between April 06 and April 13. As with previous round-ups, this post isn't meant to be an...
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between April 06 and April 13. As with previous round-ups, this post isn't meant to be an...
Vulnerabilities have been identified in Moxa EDR-810, an industrial secure router with firewall/NAT/VPN and managed Layer 2 switch functions. It is designed for Ethernet-based security applications in remote control or monitoring networks.
This post was authored by Xabier Ugarte Pedrero In July 2017 we released PyREBox, a Python Scriptable Reverse Engineering Sandbox as an open source tool. This project is part...
Vulnerabilities discovered by Tyler Bohan from Talos Overview Talos is disclosing three remote code execution vulnerabilities in the NASA CFITSIO library. CFITSIO is a library of C and Fortran subroutines...
We ask Brian Trevey and Saad Hasan, our resident Secure Data Center gurus, three simple questions on the design and implementation of security, data center and networking infrastructure solutions.
Vulnerabilities identified in Simple DirectMedia Layer's SDL2_Image library could allow code execution. Simple DirectMedia Layer is a cross-platform development library designed to provide low level access to audio, keyboard, mouse, joystick, and
Cisco Talos discloses a vulnerability within the PSD-parsing functionality of Computerinsel Photoline, an image processing tool. PSD is a document format used by Adobe Photoshop and supported by many third-party applications.
It wasn’t until late 2017 that threat researchers discovered spam campaigns delivering crypto payloads using email attachments. In some cases, a Word document downloads the crypto payload via a malicious...
Networks are becoming increasingly opaque via encrypted sessions, greatly benefiting end users because it ensures privacy and authenticity of the connection between applications over networks where we must assume zero...
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Explore our Products & Services