threats
FireEye Breach Detection Guidance
1 min read
Cyber security firm FireEye recently disclosed an incident that was reported to have resulted in the inadvertent disclosure of various internally developed offensive security tools (OSTs) that were used across FireEye red-team engagements. Some of these tools appear to be based on well-known offensive frameworks like Cobalt Strike. This is even evident in the naming […]
Creating more opportunities for others in cybersecurity
2 min read
We have some important discussions in our latest Security Stories podcast. Andy Ellis joins us to talk about representation and diversity in the cybersecurity industry, and Noureen Njoroge speaks about the huge benefits of mentoring women in IT.
DNS Hijacking Abuses Trust In Core Internet Service
1 min read
This blog post discusses the technical details of a state-sponsored attack manipulating DNS systems. While this incident is limited to targeting primarily national security organizations in the Middle East and...
Threat Roundup Sept 21 – 28
1 min read
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between Sept. 21 and 28....
Threat Roundup for Sept 14 – 21
1 min read
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between Sept. 14 and 21....
Using machine learning to target threats
3 min read
This blog post begins with a joke about two people in a forest and a bear. A bear appears out of nowhere and starts to chase these two guys during...
3 Non-Negotiables for an Effective Data Center Security & Workload Protection Strategy
4 min read
We know that big data is big business… And the use of on-premises and public cloud infrastructure is growing, according to the Cisco 2018 Security Capabilities Benchmark...
Threat Round-up for Apr 7 – Apr 14
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between April 7 and April 14. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]
IEC 104 Protocol Detection Rules
1 min read
IEC 60870-5-104 Protocol Detection Rules Cisco Talos has released 33 Snort rules which are used to analyze/inspect IEC 60870-5-104 network traffic. These rules will help Industrial Control Systems/Supervisory Control and...