Tag
#cisco
A malvertising campaign uses phishing to steal legitimate account pages, with the endgame of delivering the Lumma stealer.
The lesson for users, especially if you’re a private company that primarily uses GitHub, is just to understand the inherent dangers of using open-source software.
ShadowPad, widely considered the successor of PlugX, is a modular remote access trojan (RAT) only seen sold to Chinese hacking groups.
In this first Deep Dive with NTDR, we explore how defenders can leverage Snort for the detection of evasive malware threats.
This year marks the 10th anniversary of Cisco Talos, as the Talos brand was officially launched in August 2014 at Black Hat.
A binary in Apple macOS could allow an adversary to execute an arbitrary binary that bypasses SIP.
AccPack Khanepani version 1.0 suffers from an insecure direct object reference vulnerability.
We look back on 10 years of Talos, in multiple interviews with Talos' leaders.
Chuksrio LMS version 2.9 suffers from an insecure direct object reference vulnerability.