Threat Roundup for October 25 to November 1

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Oct 25 and Nov 1. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how […]

The commoditization of mobile espionage software

By Talos Group Mobile stalkerware has all sorts of wide-ranging consequences. The creators of these types of apps can track user’s locations, see their social media usage and more. And they certainly open the door for abuse by governments hoping to spy on their citizens, parents looking to track their children or controlling spouses hoping […]

Remote Access Trojans

By Ben Nahorney You’re working for a high-profile technology company, close to releasing a market-changing product to the public. It’s a highly contested space, with many competitors, both domestic and international. There’s also a lot of buzz in the media and online speculation on the scope and impact your new product will have. And it […]

Cisco Named a Leader in the 2019 Forrester Zero Trust Wave

By Dr. Gee Rittenhouse “Cisco has adopted a zero-trust strategy and is well-positioned as a prominent zero-trust player.” – The Forrester Wave: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019 In today’s modern work environment, where access happens everywhere, security is increasingly complex. With users, devices and clouds moving outside the traditional network, the perimeter […]

Privacy is a Shared Responsibility

By Harvey Jang Privacy is an evolving topic with diverse perspectives on how best to balance the rights and interests of consumers and companies. As allegations of data mishandling fill headlines, privacy is now front and center on everyone’s minds. While data has been the lifeblood of innovation and economic growth, there has also been […]

Threat Roundup for October 18 to October 25

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Oct 18 and Oct 25. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how […]

How to post a successful Mantis Request

Source:: Innovaphone