Threat Hunting for the Holidays
Cisco Threat Response demystifies and proactively speeds threat hunting for the stealthiest one percent of threats that can compromise your endpoints, exfiltrate your data, and disrupt your services becomes imperative.
Persian Stalker pillages Iranian users of Instagram and Telegram
State-sponsored actors have a number of different techniques at their disposal to remotely gain access to social media and secure messaging applications. Starting in 2017 and continuing through 2018, Cisco...
Threat Roundup for Sept 14 – 21
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between Sept. 14 and 21....
In Pursuit of Invisibility: Fileless Malware
A recent survey asked whether people would prefer to the ability to fly or to be invisible. Silly question, but why they chose what they did provided unique insights.
My Little FormBook
Cisco Talos has been tracking a new campaign involving the FormBook malware since May 2018 that utilizes four different malicious documents in a single phishing email. FormBook is an inexpensive...
NavRAT Uses US-North Korea Summit As Decoy For Attacks In South Korea
Talos discovered a malicious Hangul Word Processor (HWP) document targeting Korean users. If a malicious document is opened, a remote access trojan, "NavRAT," downloads with command execution and keylogging capabilities.
3 Non-Negotiables for an Effective Data Center Security & Workload Protection Strategy
We know that big data is big business… And the use of on-premises and public cloud infrastructure is growing, according to the Cisco 2018 Security Capabilities Benchmark...