Security
Headlines
HeadlinesLatestCVEs

Source

TALOS

Two remote code execution vulnerabilities disclosed in Microsoft Excel

Microsoft disclosed these issues and patched them as part of June’s monthly security release for the company.

TALOS
#vulnerability#mac#microsoft#cisco#rce
Microsoft discloses 5 critical vulnerabilities in June's Patch Tuesday, no zero-days

For the first time in four months, none of the vulnerabilities Microsoft disclosed this Patch Tuesday have been exploited in the wild.

".Zip" top-level domains draw potential for information leaks

As a result of user applications increasingly registering actual “.zip” files as URLs, these filenames may trigger unintended DNS queries or web requests, thereby revealing possibly sensitive or internal company data in a file’s name to any actor monitoring the associated DNS server

Threat Roundup for June 2 to June 9

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 2 and June 9. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key

Now’s not the time to take our foot off the gas when it comes to fighting disinformation online

YouTube released a statement that “we will stop removing content that advances false claims that widespread fraud, errors, or glitches occurred in the 2020 and other past US Presidential elections.”

Adversaries increasingly using vendor and contractor accounts to infiltrate networks

The software supply chain has become a key security focus for many organizations, but the risks associated with supply chain attacks are often misunderstood.

How Joe Marshall helps defend everything from electrical grids to grain co-ops across multiple continents

Marshall is a senior security strategist for Talos’ Strategic Communications team, specifically focusing on industrial control systems.

Threat Roundup for May 26 to June 2

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between May 26 and June 2. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key

Cybersecurity for businesses of all sizes: A blueprint for protection

Developing a robust cybersecurity practice involves implementing multiple layers of security measures that are interconnected and continually monitored, including training and awareness programs to ensure that employees follow best practices.

Legislation alone isn’t enough to stop spyware

The latest on a newly discovered phishing botnet and the latest headlines regarding how countries use spyware.