- THREAT ALERT: GootLoader - SEO Poisoning and Large Payloads Leading to Compromise
In December 2022, the Cybereason Incident Response (IR) team investigated an incident which involved new deployment methods of GootLoader.
- Cybereason advances prevention, data collection, investigation, and management capabilities
New Cybereason features and capabilities include improvements to prevention, data collection, investigation, and management capabilities.
- You Should Be Afraid of SIM Swaps
If SIM swap stories ever make the news, they focus on people who lost a lot of money. But SIM swaps also take a psychological toll...
- FBI vs. REvil [ML BSide]
Nate Nelson speaks with Rich Murray, who leads the FBI’s North Texas Cyber unit, about how the FBI dealt with dealt with another attack by REvil.
- 7 Requirements for a Successful XDR Strategy
If you’re a security practitioner wondering where to start your XDR journey, here’s a look at the fundamental building blocks of a successful XDR strategy.
Fresh off the press
- Feed has no items.
- Feed has no items.
- How Adversaries Use Politics for Compromiseon November 5, 2019
Cisco Talos recently discovered several malware distribution campaigns where the adversaries were […]
- C2 With It All: From Ransomware To Cardingon November 4, 2019
Cisco Talos recently discovered a new server hosting a large stockpile of malicious files. Our […]
- Threat Roundup for October 25 to November 1on November 1, 2019
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct 25 […]
- The commoditization of mobile espionage softwareon October 30, 2019
Mobile stalkerware has all sorts of wide-ranging consequences. The creators of these types of apps […]
- Threat Roundup for October 18 to October 25on October 25, 2019
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct 18 […]
- What is Whaling Phishing & How Does it Work?
“Whaling” phishing fraud attacks target the C-suite of a company which creates high risk of extremely sensitive, mission-critical data being stolen and […]
- Ransomware Attacks: Why Email Is Still THE Most Common Delivery Method
In this blog, we take a look at why phishing is the top delivery method of ransomware and what your organization can do to defend your data and your brand.
- What Is the Meaning of the SPF Email Standard and How Does It Work?
When it comes to being a domain owner, you need to know the meaning of SPF, or Sender Policy Framework, email standard for specifying your sending email […]
- How to Gain Stakeholder Support for Email Security Investment
Investing in email protection beyond basic anti-spam is vital to protecting an organization. Persuading leadership and stakeholders of this can be complicated. […]
- What Is an Enterprise’s Secondary Line of Defense Against Phishing Emails?
Following a multi-layered approach to phishing defense is a good idea, but using what you have close to home is best when it comes to a sensible security […]
- Feed has no items.