IEC 104 Protocol Detection Rules

By Talos Group IEC 60870-5-104 Protocol Detection Rules Cisco Talos has released 33 Snort rules which are used to analyze/inspect IEC 60870-5-104 network traffic. These rules will help Industrial Control Systems/Supervisory Control and Data Acquisition (ICS/SCADA) asset owners to allow the identification of both normal and abnormal traffic in their environments. In order for these rules to be […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Tarantool Denial of Service Vulnerabilities

By Talos Group Vulnerabilities discovered by Talos Talos is disclosing two denial of service vulnerabilities (CVE-2016-9036 & CVE-2016-9037) in Tarantool. Tarantool is an open-source lua-based application server. While primarily functioning as an application server, it is also capable of providing database-like features and providing an in-memory database which can be queried using a protocol based around the MsgPack […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Tarantool Denial of Service Vulnerabilities

By Talos Group Vulnerabilities discovered by Talos Talos is disclosing two denial of service vulnerabilities (CVE-2016-9036 & CVE-2016-9037) in Tarantool. Tarantool is an open-source lua-based application server. While primarily functioning as an application server, it is also capable of providing database-like features and providing an in-memory database which can be queried using a protocol based around the MsgPack […]

Source:: Cisco Security Notice

In the Eye of the Hailstorm

By Talos Group This blog post was authored by Jakob Dohrmann, David Rodriguez, and Jaeson Schultz. The Cisco Talos and Umbrella research teams are deploying a distributed hailstorm detection system which brings together machine learning, stream processing of DNS requests and the curated Talos email corpus. Talos has discussed snowshoe spam before. Traditional snowshoe spam campaigns are sent […]

Source:: Cisco Security Notice

In the Eye of the Hailstorm

By Talos Group This blog post was authored by Jakob Dohrmann, David Rodriguez, and Jaeson Schultz. The Cisco Talos and Umbrella research teams are deploying a distributed hailstorm detection system which brings together machine learning, stream processing of DNS requests and the curated Talos email corpus. Talos has discussed snowshoe spam before. Traditional snowshoe spam campaigns are sent […]

Source:: Cisco Security Notice

To be Effective, Security Needs to Be a Force Multiplier

By Jason Lamar Effective security is simple, open, and automated. We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard to figure out even in elite operations. What […]

Source:: Cisco Security Notice

To be Effective, Security Needs to Be a Force Multiplier

By Jason Lamar Effective security is simple, open, and automated. We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard to figure out even in elite operations. What […]

Source:: Cisco Security Notice

In plain sight: Credential and data stealing adware

By Veronica Valeros Adware has been around for a while now. In principle, displaying advertising in order to finance your software is not necessarily something bad. Users are used to seeing advertising everywhere: newspapers, magazines, and websites. When advertising was introduced to software, users had a surprisingly high tolerance for it. Later, adware applications became more aggressive. Publishers started bundling more applications and taking advantage […]

Source:: Cisco Security Notice

In plain sight: Credential and data stealing adware

By Veronica Valeros Adware has been around for a while now. In principle, displaying advertising in order to finance your software is not necessarily something bad. Users are used to seeing advertising everywhere: newspapers, magazines, and websites. When advertising was introduced to software, users had a surprisingly high tolerance for it. Later, adware applications became more aggressive. Publishers started bundling more applications and taking advantage […]

Source:: Cisco Security Notice

Microsoft Patch Tuesday – December 2016

By Talos Group The final patch Tuesday of 2016 has arrived. Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release contains 12 bulletins addressing 48 vulnerabilities. Six bulletins are rated critical and address vulnerabilities in Internet Explorer, Edge, Microsoft Graphics Components, Microsoft Uniscribe, and Adobe Flash […]

Source:: Cisco Security Notice