Talos Threat Source is a regular intelligence update from Cisco Talos, highlighting the biggest threats each week and other security news.
Microsoft addresses 21 critical vulnerabilities in latest update
Synopsis: The threat environment is a cat-and-mouse game between attackers seeking to compromise systems, and defenders that want to protect systems from attack. However, even the most sophisticated attackers leave tell-tale traces that decry their intentions or activity. In this presentation, Lee will present examples of how Cisco Talos transforms raw data into intelligence in order to detect and block the latest attacks.
Synopsis: In today's world, online crime is currently being primarily run through extortion via ransomware. Times are changing, and the business models for these types of malware are changing along with it. The rise of ransomware has paralleled a rise in the value of cryptocurrencies. The two are not necessarily connected — but the impact has been.
Synopsis: Join us in Orlando prior to Cisco Live for the first ever Cisco Talos Threat Research Summit, a one-day conference by defenders, for defenders, designed to give you actionable insights to keep your users and network safer. Throughout the summit, you will hear from leading researchers at Talos and cyber security experts from across the industry. Lurene A. Grenier, an industry veteran, will be the keynote speaker, and will be talking about why many businesses are not taking their security seriously enough.
Description: Microsoft has patched 67 new vulnerabilities across its products as part of the company’s monthly update. These vulnerabilities impact Outlook, Office, Exchange, Edge, Internet Explorer and more.
Description: There are multiple vulnerabilities in MySQL Multi-Master Manager that could allow an attacker to remotely execute code. A specially crafted MMM protocol message can cause a shell command injection, resulting in arbitrary command execution with the privileges of the mmm_agentd daemon process.
Description: Talos has released additional coverage in Snort to protect against the Banload malware, a banking trojan that first appeared in Brazil in 2016. These new rules detect command and control activity of the Banload malware.
A new ransomware called “SynAck” has been discovered using the “Doppleganging” technique to attempt to avoid detection, according to research firm Kaspersky Labs.
Twitter asked all of its users to change their passwords last week when the social media platform discovered the passwords may have been saved and exposed in plaintext.
Internet-of-things devices are being increasingly targeted as a way to deploy cryptocurrency miners.
Equifax has provided additional details on a major data breach from last year to members of U.S. Congress.
Airbnb users are being targeted by a new phishing campaign that attempts to obtain their username and password.
Vulnerabilities were found in the Logitech Harmony Hub internet-of-things device that could lead to root access.