Talos Targets Disinformation with Fake News Challenge Victory

By Talos Group This post was authored by Sean Baird with contributions by Doug Sibley and Yuxi Pan Executive Summary For the past several months, the problem of “fake news” has been abuzz in news headlines, tweets, and social media posts across the web. With historical roots in information warfare and disinformation, “fake news” is a different kind […]

Source:: Cisco Security Notice

CVRF Version 1.2 Now Available for Public Comment

By Omar Santos A few months ago, I wrote about the new OASIS Common Security Advisory Framework (CSAF) Technical Committee (TC). The purpose of the CSAF Technical Committee is to standardize the practices for structured machine-readable security vulnerability-related advisories. And then we will further refine those standards over time. The Common Vulnerability Reporting Framework (CVRF) Version 1.2, the […]

Source:: Cisco Security Notice

CVRF Version 1.2 Now Available for Public Comment

By Omar Santos A few months ago, I wrote about the new OASIS Common Security Advisory Framework (CSAF) Technical Committee (TC). The purpose of the CSAF Technical Committee is to standardize the practices for structured machine-readable security vulnerability-related advisories. And then we will further refine those standards over time. The Common Vulnerability Reporting Framework (CVRF) Version 1.2, the […]

Source:: Cisco Security Notice

Delphi Used To Score Against Palestine

By Talos Group Executive Summary This blog was authored by Paul Rascagneres and Warren Mercer with contributions from Emmanuel Tacheau, Vanja Svajcer and Martin Lee. Talos continuously monitors malicious emails campaigns. We identified one specific spear phishing campaign launched against targets within Palestine, and specifically against Palestinian law enforcement agencies. This campaign started in April 2017, using a […]

Source:: Cisco Security Notice

Delphi Used To Score Against Palestine

By Talos Group Executive Summary This blog was authored by Paul Rascagneres and Warren Mercer with contributions from Emmanuel Tacheau, Vanja Svajcer and Martin Lee. Talos continuously monitors malicious emails campaigns. We identified one specific spear phishing campaign launched against targets within Palestine, and specifically against Palestinian law enforcement agencies. This campaign started in April 2017, using a […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Multiple Foscam C1 Vulnerabilities Come in to Focus

By Talos Group Executive Summary The Foscam C1 is a webcam that is marketed for use in a variety of applications including home security monitoring. As an indoor webcam, it is designed to be set up inside of a building and features the ability to be accessed remotely via a web interface or from within a mobile application. […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Multiple Foscam C1 Vulnerabilities Come in to Focus

By Talos Group Executive Summary The Foscam C1 is a webcam that is marketed for use in a variety of applications including home security monitoring. As an indoor webcam, it is designed to be set up inside of a building and features the ability to be accessed remotely via a web interface or from within a mobile application. […]

Source:: Cisco Security Notice

Deep dive in Lexmark Perceptive Document Filters Exploitation

By Talos Group This post authored by Marcin Noga with contributions from Nick Biasini Introduction Talos discovers and releases software vulnerabilities on a regular basis. We don’t always publish a deep technical analysis of how the vulnerability was discovered or its potential impact. This blog will cover these technical aspects including discovery and exploitation. Before we deep dive into […]

Source:: Cisco Security Notice

Deep dive in Lexmark Perceptive Document Filters Exploitation

By Talos Group This post authored by Marcin Noga with contributions from Nick Biasini Introduction Talos discovers and releases software vulnerabilities on a regular basis. We don’t always publish a deep technical analysis of how the vulnerability was discovered or its potential impact. This blog will cover these technical aspects including discovery and exploitation. Before we deep dive into […]

Source:: Cisco Security Notice

Malicious Spam Comes Roaring Back and Cisco Email Security is Ready

By Beth Barach “Did you get my email? The really urgent one? About funding for your new project?” “Maybe. I can’t tell. My inbox is full of spam and I am busy scrutinizing every email and domain name to make sure the sender is a valid person that I actually know and the attachment is a valid… Oh […]

Source:: Cisco Security Notice