We Infiltrated a Counterfeit Check Ring! Now What?
Imagine waking up each morning knowing the identities of thousands of people who are about to be mugged for thousands of dollars each. You know exactly...
Cyber Security Expert
Imagine waking up each morning knowing the identities of thousands of people who are about to be mugged for thousands of dollars each. You know exactly...
Piotr Bania of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. Cisco Talos recently discovered a memory corruption vulnerability in PowerISO’s handler that deals with...
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between June 18 and June 25. As with previous roundups, this post isn’t...
Hard drive giant Western Digital is urging users of its MyBook Live brand of network storage drives to disconnect them from the Internet, warning that malicious...
In 2015, police departments worldwide started finding ATMs compromised with advanced new “shimming” devices made to steal data from chip card transactions. Authorities in the United...
Amid multiple recent reports of hackers breaking into and tampering with drinking water treatment systems comes a new industry survey with some sobering findings: A majority...
What’s the low-hanging fruit for ransomware attackers? What steps could help to fend them off, and what’s stopping organizations from implementing those steps? Go to Source...
This is the fourth time in a bit over a year that Carnival’s admitted to breaches, with two of them being ransomware attacks. Go to Source...
Troy Gill, manager of security research at Zix, discusses the most common ways sensitive data is scooped up by nefarious sorts. Go to Source Author: Troy Gill
By Jon Munshaw. The latest episode of Talos Takes is available now. Download this episode and subscribe to Talos Takes using the buttons below, or visit...
Recent Comments