Taking the FIRST look at Crypt0l0cker
By Talos Group This post is authored by Matthew Molyett. Executive Summary In March, Talos reported on the details of Crypt0l0cker based on an extensive analysis I carried out on the sample binaries. Binaries — plural — because, as noted in the original blog, the Crypt0l0cker payload leveraged numerous executable files which shared the same […]
Replace your AV with Next Generation Endpoint Security
By Joe Malenfant If you’ve been to a security conference in the last year you’ve probably seen more than 20 different vendors all talking about endpoint security. Some might be talking about next generation anti-virus, endpoint detection and response, and even the much lauded machine learning. How do you cut through the clutter and noise […]
Replace your AV with Next Generation Endpoint Security
By Joe Malenfant If you’ve been to a security conference in the last year you’ve probably seen more than 20 different vendors all talking about endpoint security. Some might be talking about next generation anti-virus, endpoint detection and response, and even the much lauded machine learning. How do you cut through the clutter and noise […]
Die Auswahl der richtigen Firewall
Eine der größten Herausforderungen für Unternehmen ist die Auswahl der richtigen IT-Security-Komponenten. Der Markt ist hier quasi unüberschaubar und eine Vielzahl Anbieter buhlen um die Budgets. Dabei hat jeder Anbieter die beste Lösung im Portfolio und deren Marketingabteilungen produzieren bunte Statistiken und Whitepaper, um den Kunden zu überzeugen. Orientierung in diesem Dickicht bieten unabhängige Tests, […]
The Real IoT Opportunity for Enterprises? A Chance to Address Security Risks Head On
By Craig Williams When business leaders think about the Internet of Things (IoT), they tend to focus on the potential opportunities for the enterprise and give far less attention to security risks. That’s a mistake. So, too, is believing that the IoT is only a concept on the distant horizon. The IoT already exists and […]
The Real IoT Opportunity for Enterprises? A Chance to Address Security Risks Head On
By Craig Williams When business leaders think about the Internet of Things (IoT), they tend to focus on the potential opportunities for the enterprise and give far less attention to security risks. That’s a mistake. So, too, is believing that the IoT is only a concept on the distant horizon. The IoT already exists and […]
Vulnerability Spotlight: EZB Systems UltraISO ISO Parsing Code Execution Vulnerability
By Talos Group Discovered by Piotr Bania of Cisco Talos Today, Talos is releasing details of a new vulnerability discovered within the EZB Systems UltraISO ISO disk image creator software. TALOS-2017-0342 (CVE-2017-2840) may allow an attacker to execute arbitrary code remotely on the vulnerable system when a specially crafted ISO image is opened and parsed […]

