Cisco Talos

Two vulnerabilities in SoftPerfect RAM Disk

Cisco Talos researchers recently discovered that a specific driver in the SoftPerfect RAM disk could allow an adversary to delete files on an arbitrary basis and disclose sensitive information.

Microsoft issues security update for Azure Sphere

Cisco Talos researchers recently discovered seven vulnerabilities in Microsoft’s Azure Sphere, a cloud-connected SoC platform designed specifically with IoT application security in mind.

Prometei botnet and its quest for Monero

The Prometei botnet has more than 15 executable modules that all get downloaded and driven by the main module, which constantly communicates with the command and control (C2) server over HTTP.

Multiple vulnerabilities in RemoteFX affects, AMD, Intel chips

Cisco Talos researchers discovered multiple vulnerabilities in Intel’s Graphics Accelerator Driver and in an AMD Radeon driver.

WastedLocker Goes "Big-Game Hunting" in 2020

The adversary behind these attacks is taking advantage of various "dual-use" toolsets like Cobalt Strike, Mimikatz, Empire, and PowerSploit to facilitate lateral movement across targeted environments.

Researchers find Google Chrome PDFium memory corruption vulnerability

It supports the use of JavaScript embedded inside PDFs and other specially crafted documents that could corrupt the application memory, allowing attackers to perform arbitrary code execution.

Remote code execution vulnerabilities discovered in LEADTOOLS 20

This specific vulnerability exists in the ANI file format parser inside LEADTOOLS.

New information disclosure vulnerability discovered in Mozilla Firefox

An information disclosure flaw exists in the URL mPath functionality of Mozilla Firefox that could be exploited by tricking users into visiting a specially crafted webpage through the browser.

PROMETHIUM extends global reach with StrongPity3 APT

Cisco Talos identified around 30 new C2 domains associated with the PROMETHIUM threat actor group. The samples related to StrongPity3 targeted victims in Colombia, India, Canada, and Vietnam.

Tor2Mine Refreshes Cryptomining Campaign Along With New Information Stealing Malware

The addition of new tactics, techniques, and procedures (TTPs) suggest Tor2Mine is seeking ways to diversify their revenue in a volatile cryptocurrency market.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags