Einträge von Technik Support

PyREBox, a Python scriptable Reverse Engineering sandbox

By Talos Group This post was authored by Xabier Ugarte Pedrero In Talos, we are continuously trying to improve our research and threat intelligence capabilities. As a consequence, we not only leverage standard tools for analysis, but we also focus our efforts on innovation, developing our own technology to overcome new challenges. Also, Talos has […]

PyREBox, a Python scriptable Reverse Engineering sandbox

By Talos Group This post was authored by Xabier Ugarte Pedrero In Talos, we are continuously trying to improve our research and threat intelligence capabilities. As a consequence, we not only leverage standard tools for analysis, but we also focus our efforts on innovation, developing our own technology to overcome new challenges. Also, Talos has […]

For Women in Cybersecurity, Possibilities are Endless

By Sujata Ramamoorthy This blog is the third in a series of posts sharing perspectives from Cisco women in security. Previous blogs featured Michele Guel, Engineer and Chief Security Architect and Michelle Dennedy, Chief Privacy Officer. When the public thinks of cybersecurity we often envision people sitting in dark rooms writing code and fighting hackers. […]

For Women in Cybersecurity, Possibilities are Endless

By Sujata Ramamoorthy This blog is the third in a series of posts sharing perspectives from Cisco women in security. Previous blogs featured Michele Guel, Engineer and Chief Security Architect and Michelle Dennedy, Chief Privacy Officer. When the public thinks of cybersecurity we often envision people sitting in dark rooms writing code and fighting hackers. […]

Memcached – A Story of Failed Patching & Vulnerable Servers

By Talos Group This blog authored by Aleksandar Nikolich and David Maynor with contributions from Nick Biasini Memcached – Not secure, Not Patched Fast Enough Recently high profile vulnerabilities in systems were used to unleash several global ransomware attacks that greatly impacted organizations. These types of vulnerabilities were previously patched and could have been addressed […]

Memcached – A Story of Failed Patching & Vulnerable Servers

By Talos Group This blog authored by Aleksandar Nikolich and David Maynor with contributions from Nick Biasini Memcached – Not secure, Not Patched Fast Enough Recently high profile vulnerabilities in systems were used to unleash several global ransomware attacks that greatly impacted organizations. These types of vulnerabilities were previously patched and could have been addressed […]

Are You The Lucky One? Sometimes Luck Can Bring You Malware

By Anna Shirokova For more than two decades, malicious actors have been evolving their Phishing techniques to effectively achieve their goals. From poorly crafted scams to extremely well crafted documents, Phishing attacks keep being a very effective technique in the attackers toolbox. Anyone can be a target. While more sophisticated phishing attacks are constantly changing, […]

Are You The Lucky One? Sometimes Luck Can Bring You Malware

By Anna Shirokova For more than two decades, malicious actors have been evolving their Phishing techniques to effectively achieve their goals. From poorly crafted scams to extremely well crafted documents, Phishing attacks keep being a very effective technique in the attackers toolbox. Anyone can be a target. While more sophisticated phishing attacks are constantly changing, […]