- THREAT ALERT: GootLoader - SEO Poisoning and Large Payloads Leading to Compromise
In December 2022, the Cybereason Incident Response (IR) team investigated an incident which involved new deployment methods of GootLoader.
- Cybereason advances prevention, data collection, investigation, and management capabilities
New Cybereason features and capabilities include improvements to prevention, data collection, investigation, and management capabilities.
- You Should Be Afraid of SIM Swaps
If SIM swap stories ever make the news, they focus on people who lost a lot of money. But SIM swaps also take a psychological toll...
- FBI vs. REvil [ML BSide]
Nate Nelson speaks with Rich Murray, who leads the FBI’s North Texas Cyber unit, about how the FBI dealt with dealt with another attack by REvil.
- 7 Requirements for a Successful XDR Strategy
If you’re a security practitioner wondering where to start your XDR journey, here’s a look at the fundamental building blocks of a successful XDR strategy.
Fresh off the press
- Fresh Phish: Fake SharePoint Faxon April 24, 2024
- Breaking Down the FinCEN Anti-Money Laundering Rule: What Is Considered Residential Property?on April 11, 2024
The U.S. Treasury Department’s Financial Crimes Enforcement Network (FinCEN) issued a notice of […]
- FBI Reports Cybercrime Losses Hit $12.5B, Record Number of Complaints Filed in 2023on April 9, 2024
Source: FBI Internet Crime Report Cybercrime losses rose to $12.5 billion and and reported […]
- Fresh Phish: U.S. Post Office Text Phishing Messageon April 4, 2024
- Alert: Spoofed Email Appears to Come from ALTA Presidenton April 4, 2024
ALTA is alerting its members of phishing emails with "ALTA" and the company name in the […]
- Friday Five: Controversial Data Privacy Legislation, Protecting Critical Infrastructure, & Moreon April 26, 2024
A major data privacy bill and proposed regulation have taken steps forward to becoming reality this past week. Meanwhile, China looms large as a significant […]
- What Is Audit Logging? How It Works & Why You Need Iton April 22, 2024
An audit log is a document that records the activities within an application, system, or network. Learn more about audit logging in today's blog.
- Friday Five: Incoming Regulatory Changes, a New Malware Threat, & Moreon April 19, 2024
Catch up on all of this past week's headlines, including changes coming to water system cyber standards and personal data purchasing power, a familiar, yet […]
- What Is Data Sanitization? How It Protects Your Organizationon April 18, 2024
Data sanitization is the irreversible and permanent elimination of sensitive data from a storage device, rendering it unrecoverable or reconstructable.
- What is Secure Service Edge (SSE)? Enhancing Data Protection in the Cloud Eraon April 15, 2024
Cybersecurity has become more critical than ever, with data protection being at the top of organizations' minds. Enter Secure Service Edge (SSE). Read on to […]
- How Adversaries Use Politics for Compromiseon November 5, 2019
Cisco Talos recently discovered several malware distribution campaigns where the adversaries were […]
- C2 With It All: From Ransomware To Cardingon November 4, 2019
Cisco Talos recently discovered a new server hosting a large stockpile of malicious files. Our […]
- Threat Roundup for October 25 to November 1on November 1, 2019
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct 25 […]
- The commoditization of mobile espionage softwareon October 30, 2019
Mobile stalkerware has all sorts of wide-ranging consequences. The creators of these types of apps […]
- Threat Roundup for October 18 to October 25on October 25, 2019
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct 18 […]
- What is Whaling Phishing & How Does it Work?
“Whaling” phishing fraud attacks target the C-suite of a company which creates high risk of extremely sensitive, mission-critical data being stolen and […]
- Ransomware Attacks: Why Email Is Still THE Most Common Delivery Method
In this blog, we take a look at why phishing is the top delivery method of ransomware and what your organization can do to defend your data and your brand.
- What Is the Meaning of the SPF Email Standard and How Does It Work?
When it comes to being a domain owner, you need to know the meaning of SPF, or Sender Policy Framework, email standard for specifying your sending email […]
- How to Gain Stakeholder Support for Email Security Investment
Investing in email protection beyond basic anti-spam is vital to protecting an organization. Persuading leadership and stakeholders of this can be complicated. […]
- What Is an Enterprise’s Secondary Line of Defense Against Phishing Emails?
Following a multi-layered approach to phishing defense is a good idea, but using what you have close to home is best when it comes to a sensible security […]
- Feed has no items.