Source
TALOS
As with everything nowadays, politics are sure to come into play.
Pentney and his team are threat hunters and researchers who contribute to Talos’ research and reports shared with government and private sector partners.
The lesson for users, especially if you’re a private company that primarily uses GitHub, is just to understand the inherent dangers of using open-source software.
ShadowPad, widely considered the successor of PlugX, is a modular remote access trojan (RAT) only seen sold to Chinese hacking groups.
In this first Deep Dive with NTDR, we explore how defenders can leverage Snort for the detection of evasive malware threats.
This year marks the 10th anniversary of Cisco Talos, as the Talos brand was officially launched in August 2014 at Black Hat.
A binary in Apple macOS could allow an adversary to execute an arbitrary binary that bypasses SIP.
We look back on 10 years of Talos, in multiple interviews with Talos' leaders.
Seeing a “blue screen of death,” often with code that looks indecipherable, has been ingrained into our heads that it’s a “hack."
Although there was a decrease in BEC engagements from last quarter, it was still a major threat for the second quarter in a row.