Talos

January 22, 2021

THREAT RESEARCH

Threat Roundup for January 15 to January 22

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between January 15 and January 22. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

January 15, 2021

THREAT RESEARCH

Threat Roundup for January 8 to January 15

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between January 8 and January 15. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

January 15, 2021

SECURITY

Election Security: A conversation with Matt Olney from Cisco Talos

5 min read

In advance of our third annual “Defending Against Critical Threats” report, a roundup of some the most impactful cyber attacks from the past 12 months, here is a preview of we an interview with Matt Olney, to capture his thoughts post-election.

December 21, 2020

THREAT RESEARCH

Talos Vulnerability Discovery Year in Review — 2020

1 min read

Cisco Talos' Systems Vulnerability Research Team discovered 231 vulnerabilities this year across a wide range of products. And thanks to our vendor partners, these vulnerabilities were patched and published before any attackers could exploit them. Mitigating possible zero-day breeches in your defenses is the easiest and fastest way to prevent wide-ranging and business-critical cyber attacks.

December 18, 2020

THREAT RESEARCH

Threat Roundup for December 11 to December 18

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between December 11 and December 18. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

December 11, 2020

THREAT RESEARCH

Threat Roundup for December 4 to December 11

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between December 4 and December 11. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

December 4, 2020

THREAT RESEARCH

Threat Roundup for November 27 to December 4

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between November 27 and December 4. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically […]

November 20, 2020

THREAT RESEARCH

Threat Roundup for November 13 to November 20

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between November 13 and November 20. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically […]

November 17, 2020

THREAT RESEARCH

Nibiru ransomware variant decryptor

1 min read

Nikhil Hegde developed this tool. Weak encryption The Nibiru ransomware is a .NET-based malware family. It traverses directories in the local disks, encrypts files with Rijndael-256 and gives them a .Nibiru extension. Rijndael-256 is a secure encryption algorithm. However, Nibiru uses a hard-coded string “Nibiru” to compute the 32-byte key and 16-byte IV values. The […]