Not So Crystal Clear – Zeus Variant Spoils Ukrainian Holiday

By Talos Group This post was authored by Edmund Brumaghin with contributions from Ben Baker, Dave Maynor and Matthew Molyett. Introduction Talos has observed a cyber attack which was launched using the official website of the Ukraine-based accounting software developer Crystal Finance Millennium (CFM). This vector is similar to the attack outlined by Talos in the Nyetya and companion MeDoc blog post. Ukrainian authorities and businesses were […]

Source:: Cisco Security Notice

Not So Crystal Clear – Zeus Variant Spoils Ukrainian Holiday

By Talos Group This post was authored by Edmund Brumaghin with contributions from Ben Baker, Dave Maynor and Matthew Molyett. Introduction Talos has observed a cyber attack which was launched using the official website of the Ukraine-based accounting software developer Crystal Finance Millennium (CFM). This vector is similar to the attack outlined by Talos in the Nyetya and companion MeDoc blog post. Ukrainian authorities and businesses were […]

Source:: Cisco Security Notice

Harnessing the Power of Network Meta Data: Finding Malware

By Brian Ford Probably not a day goes by without someone telling you about a new vulnerability or threat to your network and your data. These threats are seemingly everywhere. In order to protect against these threats, we use strong passwords and encryption. Unfortunately, our adversaries are getting the same messages as they continue to scoop up our […]

Source:: Cisco Security Notice

Harnessing the Power of Network Meta Data: Finding Malware

By Brian Ford Probably not a day goes by without someone telling you about a new vulnerability or threat to your network and your data. These threats are seemingly everywhere. In order to protect against these threats, we use strong passwords and encryption. Unfortunately, our adversaries are getting the same messages as they continue to scoop up our […]

Source:: Cisco Security Notice

Introducing Exploit Prevention to Stop File-Less Attacks

By John Dominguez In war, any good military strategist will try to exploit their enemy’s weaknesses. Cybercriminals are no different. Their latest tactic: use file-less attacks to exploit vulnerabilities in everyday applications.

Source:: Cisco Security Notice

Introducing Exploit Prevention to Stop File-Less Attacks

By John Dominguez In war, any good military strategist will try to exploit their enemy’s weaknesses. Cybercriminals are no different. Their latest tactic: use file-less attacks to exploit vulnerabilities in everyday applications.

Source:: Cisco Security Notice