Gamaredon – When nation states don’t pay all the bills

By Warren Mercer and Vitor Ventura. Gamaredon is a threat actor, active since at least 2013, that has long been associated with pro-Russian activities in several reports throughout the years. It is extremely aggressive and is usually not associated with high-visibility campaigns, Cisco Talos sees it is incredibly active and we believe the group is […]

Continue Reading

Threat Roundup for February 12 to February 19

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Feb. 12 and Feb. 19. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

Continue Reading

Threat Roundup for February 5 to February 12

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Feb. 5 and Feb. 12. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

Continue Reading

Threat Roundup for January 29 to February 5

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Jan. 29 and Feb. 5. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threatsx we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

Continue Reading

Threat Roundup for January 22 to January 29

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Jan. 22 and Jan. 29. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

Continue Reading

Threat Roundup for January 15 to January 22

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Jan. 15 and Jan. 22. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

Continue Reading

Threat Roundup for January 8 to January 15

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Jan. 8 and Jan. 15. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

Continue Reading

Talos Vulnerability Discovery Year in Review — 2020

While major attacks like ransomware and COVID-19-themed campaigns made headlines across the globe this year, many attacks were prevented through simple practices of finding, disclosing and patching vulnerabilities. Cisco Talos’ Systems Vulnerability Research Team discovered 231 vulnerabilities this year across a wide range of products. And thanks to our vendor partners, these vulnerabilities were patched […]

Continue Reading

Threat Roundup for December 11 to December 18

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Dec. 11 and Dec. 18. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

Continue Reading

Threat Roundup for December 4 to December 11

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Dec. 4 and Dec. 11. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

Continue Reading