The Mutiny Fuzzing Framework and Decept Proxy

By Talos Group This blog post is authored by James Spadaro of Cisco ASIG and Lilith Wyatt of Cisco Talos. Imagine a scenario where you, as a vulnerability researcher, are tasked with auditing a network application to identify vulnerabilities. By itself, the task may not seem too daunting until you learn of a couple conditions […]

Doppelte Power für Ihren Server

Beim Kauf eines FUJITSU Server PRIMERGY Systems erhalten Sie jetzt zusätzliche Komponenten kostenlos dazu, zum Beispiel einen zweiten Prozessor oder doppelten Arbeitsspeicher. Die Aktion gilt für die folgenden PRIMERGY RX Systeme: PRIMERGY RX2510 M2 PRIMERGY RX2520 M2 PRIMERGY RX2530 M2 und M4 PRIMERGY RX2540 M2 und M4 PRIMERGY RX2560 M2 CPU und RAM for free […]

Cisco Cloudlock joins the Box Trust ecosystem

By Russell Miller We live in an age where technology is core to business and can impact success. Staying competitive requires adopting and adapting to new technology. Direct correlation can be drawn to the pace of innovation and collaboration among teams. Companies spend billions of dollars every year to implement solutions that help teams collaborate […]

Cisco Cloudlock joins the Box Trust ecosystem

By Russell Miller We live in an age where technology is core to business and can impact success. Staying competitive requires adopting and adapting to new technology. Direct correlation can be drawn to the pace of innovation and collaboration among teams. Companies spend billions of dollars every year to implement solutions that help teams collaborate […]

Recam Redux – DeConfusing ConfuserEx

By Talos Group Overview This report shows how to deobfuscate a custom .NET ConfuserEx protected malware. We identified this recent malware campaign from our Advanced Malware Protection (AMP) telemetry. Initial infection is via a malicious Word document, the malware ultimately executes in memory an embedded payload from the Recam family. Recam is an information stealer. […]

Recam Redux – DeConfusing ConfuserEx

By Talos Group Overview This report shows how to deobfuscate a custom .NET ConfuserEx protected malware. We identified this recent malware campaign from our Advanced Malware Protection (AMP) telemetry. Initial infection is via a malicious Word document, the malware ultimately executes in memory an embedded payload from the Recam family. Recam is an information stealer. […]

You already own the most powerful security tool. Are you really using it? Really?

By Dan Stotts See and stop threats using your existing network. If you live in the United States, there’s a 44% chance your most valuable personal data were recently compromised[1]. The silver lining, if there is one, is that this breach compelled many to start actively monitoring their credit report for signs of suspicious activity. […]