- THREAT ALERT: GootLoader - SEO Poisoning and Large Payloads Leading to Compromise
In December 2022, the Cybereason Incident Response (IR) team investigated an incident which involved new deployment methods of GootLoader.
- Cybereason advances prevention, data collection, investigation, and management capabilities
New Cybereason features and capabilities include improvements to prevention, data collection, investigation, and management capabilities.
- You Should Be Afraid of SIM Swaps
If SIM swap stories ever make the news, they focus on people who lost a lot of money. But SIM swaps also take a psychological toll...
- FBI vs. REvil [ML BSide]
Nate Nelson speaks with Rich Murray, who leads the FBI’s North Texas Cyber unit, about how the FBI dealt with dealt with another attack by REvil.
- 7 Requirements for a Successful XDR Strategy
If you’re a security practitioner wondering where to start your XDR journey, here’s a look at the fundamental building blocks of a successful XDR strategy.
Fresh off the press
- Fresh Phish: Fake SharePoint Faxon April 24, 2024
- Breaking Down the FinCEN Anti-Money Laundering Rule: What Is Considered Residential Property?on April 11, 2024
The U.S. Treasury Department’s Financial Crimes Enforcement Network (FinCEN) issued a notice of […]
- FBI Reports Cybercrime Losses Hit $12.5B, Record Number of Complaints Filed in 2023on April 9, 2024
Source: FBI Internet Crime Report Cybercrime losses rose to $12.5 billion and and reported […]
- Fresh Phish: U.S. Post Office Text Phishing Messageon April 4, 2024
- Alert: Spoofed Email Appears to Come from ALTA Presidenton April 4, 2024
ALTA is alerting its members of phishing emails with "ALTA" and the company name in the […]
- New CERT-In Guidelines for Security Breaches: What You Need to Knowon April 29, 2024
In India, new CERT-In guidelines for security breaches have introduced new requirements for businesses to comply with, including one that requires […]
- Friday Five: Controversial Data Privacy Legislation, Protecting Critical Infrastructure, & Moreon April 26, 2024
A major data privacy bill and proposed regulation have taken steps forward to becoming reality this past week. Meanwhile, China looms large as a significant […]
- What Is Audit Logging? How It Works & Why You Need Iton April 22, 2024
An audit log is a document that records the activities within an application, system, or network. Learn more about audit logging in today's blog.
- Friday Five: Incoming Regulatory Changes, a New Malware Threat, & Moreon April 19, 2024
Catch up on all of this past week's headlines, including changes coming to water system cyber standards and personal data purchasing power, a familiar, yet […]
- What Is Data Sanitization? How It Protects Your Organizationon April 18, 2024
Data sanitization is the irreversible and permanent elimination of sensitive data from a storage device, rendering it unrecoverable or reconstructable.
- How Adversaries Use Politics for Compromiseon November 5, 2019
Cisco Talos recently discovered several malware distribution campaigns where the adversaries were […]
- C2 With It All: From Ransomware To Cardingon November 4, 2019
Cisco Talos recently discovered a new server hosting a large stockpile of malicious files. Our […]
- Threat Roundup for October 25 to November 1on November 1, 2019
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct 25 […]
- The commoditization of mobile espionage softwareon October 30, 2019
Mobile stalkerware has all sorts of wide-ranging consequences. The creators of these types of apps […]
- Threat Roundup for October 18 to October 25on October 25, 2019
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct 18 […]
- What is Whaling Phishing & How Does it Work?
“Whaling” phishing fraud attacks target the C-suite of a company which creates high risk of extremely sensitive, mission-critical data being stolen and […]
- Ransomware Attacks: Why Email Is Still THE Most Common Delivery Method
In this blog, we take a look at why phishing is the top delivery method of ransomware and what your organization can do to defend your data and your brand.
- What Is the Meaning of the SPF Email Standard and How Does It Work?
When it comes to being a domain owner, you need to know the meaning of SPF, or Sender Policy Framework, email standard for specifying your sending email […]
- How to Gain Stakeholder Support for Email Security Investment
Investing in email protection beyond basic anti-spam is vital to protecting an organization. Persuading leadership and stakeholders of this can be complicated. […]
- What Is an Enterprise’s Secondary Line of Defense Against Phishing Emails?
Following a multi-layered approach to phishing defense is a good idea, but using what you have close to home is best when it comes to a sensible security […]
- Feed has no items.