Research Spotlight: The Resurgence of Qbot

By Talos Group The post was authored by Ben Baker. Qbot, AKA Qakbot, has been around for since at least 2008, but it recently experienced a large surge in development and deployments. Qbot is being Qbot primarily targets sensitive information like banking credentials. Here we are unveiling recent changes to the malware that haven’t been made public yet. […]

Source:: Cisco Security Notice

The Evolution of Scoring Security Vulnerabilities

By Omar Santos The Common Vulnerability Scoring System (CVSS), which is used by many in the industry as a standard way to assess and score security vulnerabilities, is evolving to a new version known as CVSSv3. These changes addressed some of the challenges that existed in CVSSv2; CVSSv3 analyzes the scope of a vulnerability and identifies the privileges […]

Source:: Cisco Security Notice

The Evolution of Scoring Security Vulnerabilities

By Omar Santos The Common Vulnerability Scoring System (CVSS), which is used by many in the industry as a standard way to assess and score security vulnerabilities, is evolving to a new version known as CVSSv3. These changes addressed some of the challenges that existed in CVSSv2; CVSSv3 analyzes the scope of a vulnerability and identifies the privileges […]

Source:: Cisco Security Notice

The “Wizzards” of Adware

By Talos Group Talos posted a blog, September 2015, which aimed to identify how often seemingly benign software can be rightly condemned for being a piece of malware. With this in mind, this blog presents an interesting piece of “software” which we felt deserved additional information disclosure. This software exhibits several questionable behaviors including: Attempts to detect sandboxes […]

Source:: Cisco Security Notice

The “Wizzards” of Adware

By Talos Group Talos posted a blog, September 2015, which aimed to identify how often seemingly benign software can be rightly condemned for being a piece of malware. With this in mind, this blog presents an interesting piece of “software” which we felt deserved additional information disclosure. This software exhibits several questionable behaviors including: Attempts to detect sandboxes […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Further NTPD Vulnerabilities

By Talos Group As a member of the Linux Foundation Core Infrastructure Initiative, Cisco is contributing to the CII effort by evaluating the Network Time Protocol daemon (ntpd) for security defects. We previously identified a series of vulnerabilities in the Network Time Protocol daemon; through our continued research we have identified further vulnerabilities in the software. Read More>>

Source:: Cisco Security Notice

Vulnerability Spotlight: Further NTPD Vulnerabilities

By Talos Group As a member of the Linux Foundation Core Infrastructure Initiative, Cisco is contributing to the CII effort by evaluating the Network Time Protocol daemon (ntpd) for security defects. We previously identified a series of vulnerabilities in the Network Time Protocol daemon; through our continued research we have identified further vulnerabilities in the software. Read More>>

Source:: Cisco Security Notice

The Service Provider Security Question

By Scott Harrell I talk to a lot of customers and partners in the Service Provider space, and among the many conversations, I notice a common set of concerns centered around a simple question: have we done all that we can to secure both our own infrastructure and that of our customers? Simple enough question, but the answer […]

Source:: Cisco Security Notice

The Service Provider Security Question

By Scott Harrell I talk to a lot of customers and partners in the Service Provider space, and among the many conversations, I notice a common set of concerns centered around a simple question: have we done all that we can to secure both our own infrastructure and that of our customers? Simple enough question, but the answer […]

Source:: Cisco Security Notice

Threat Spotlight: Exploit Kit Goes International Hits 150+ Countries

By Talos Group This post authored by Nick Biasini Talos is constantly monitoring the threat landscape and exploit kits are a constantly evolving component of it. An ongoing goal of Talos is to expose and disrupt these kits to protect the average internet user being targeted and compromised. We were able to gain unprecedented insight into Angler exploit […]

Source:: Cisco Security Notice