Tag: Cisco Talos Blog

One newsletter to rule them all

Hazel embarks on a creative fitness journey, virtually crossing Middle-earth via The Conqueror app while sharing key cybersecurity insights. This article has been indexed from Cisco Talos Blog Read the original article: One newsletter to rule them all

New BYOVD loader behind DeadLock ransomware attack

Cisco Talos has uncovered a new DeadLock ransomware campaign using a previously unknown BYOVD loader to exploit a Baidu Antivirus driver vulnerability, letting threat actors disable EDR defenses and escalate attacks. This article has been indexed from Cisco Talos Blog…

Your year-end infosec wrapped

Bill explores how our biggest mistakes can be the catalysts for growth that we need. This week’s newsletter promises stories, lessons, and a fresh perspective on failure. This article has been indexed from Cisco Talos Blog Read the original article:…

Spy vs. spy: How GenAI is powering defenders and attackers

Generative AI is rapidly transforming cybersecurity for both defenders and attackers. This blog highlights current uses, emerging threats, and the evolving landscape as capabilities advance. This article has been indexed from Cisco Talos Blog Read the original article: Spy vs.…

Dell ControlVault, Lasso, GL.iNet vulnerabilities

Cisco Talos’ Vulnerability Discovery & Research team recently disclosed five vulnerabilities in Dell ControlVault 3 firmware and its associated Windows software, four vulnerabilities in Entr'ouvert Lasso, and one vulnerability in GL.iNet Slate AX. The vulnerabilities mentioned in this blog post…

Care that you share

This holiday season, as teams run lean and cyber threats rise, being open with what — and how — you share can protect both information and relationships. This article has been indexed from Cisco Talos Blog Read the original article:…

It’s not personal, it’s just business

Martin muses on how agentic AI is bringing efficiency improvements to the business of cyber crime. This article has been indexed from Cisco Talos Blog Read the original article: It’s not personal, it’s just business

Viasat and the terrible, horrible, no good, very bad day

In this week’s newsletter, Amy recounts her journey from Halloween festivities to unraveling the story of the 2022 Viasat satellite hack, with plenty of cybersecurity surprises along the way. This article has been indexed from Cisco Talos Blog Read the…

Unleashing the Kraken ransomware group

In August 2025, Cisco Talos observed big-game hunting and double extortion attacks carried out by Kraken, a Russian-speaking group that has emerged from the remnants of the HelloKitty ransomware cartel. This article has been indexed from Cisco Talos Blog Read…

Remember, remember the fifth of November

This edition, Hazel explores the origins of Guy Fawkes Day and how heeding an anonymous warning prevented an assassination. This article has been indexed from Cisco Talos Blog Read the original article: Remember, remember the fifth of November

TruffleHog, Fade In and BSAFE Crypto-C vulnerabilities

Cisco Talos’ Vulnerability Discovery & Research team recently disclosed three vulnerabilities in Dell BSAFE, two in Fade In screenwriting software, and one in Trufflehog  The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in…

Trick, treat, repeat

Thor gets into the Halloween spirit, sharing new CVE trends, a “treat” for European Windows 10 users, and a reminder that patching is your best defense against zombie vulnerabilities. This article has been indexed from Cisco Talos Blog Read the…

Dynamic binary instrumentation (DBI) with DynamoRio

Learn how to build your own dynamic binary instrumentation (DBI) tool with open-source DynamoRIO to enable malware analysis, security auditing, reverse engineering, and more. This article has been indexed from Cisco Talos Blog Read the original article: Dynamic binary instrumentation…