Staying Ahead of the Evolving Threat – Announcing the Cisco 2017 Annual Cybersecurity Report
By John N. Stewart I’m proud to announce the Cisco 2017 Annual Cybersecurity Report (ACR) available for download today. Now in its 10th year, this report delivers analysis on the evolving threats and trends from 2016, insights from a survey of more than 2900 security professionals worldwide, as well as guidance on how to be […]
Staying Ahead of the Evolving Threat – Announcing the Cisco 2017 Annual Cybersecurity Report
By John N. Stewart I’m proud to announce the Cisco 2017 Annual Cybersecurity Report (ACR) available for download today. Now in its 10th year, this report delivers analysis on the evolving threats and trends from 2016, insights from a survey of more than 2900 security professionals worldwide, as well as guidance on how to be […]
EyePyramid: An Archaeological Journey
By Talos Group The few last days, a malware sample named EyePyramid has received considerable attention, especially in Italy. The Italian police have arrested two suspects and also published a preliminary report of the investigation. This malware is notable due to the targeting of Italian celebrities and politicians. We conducted our analysis on one of […]
EyePyramid: An Archaeological Journey
By Talos Group The few last days, a malware sample named EyePyramid has received considerable attention, especially in Italy. The Italian police have arrested two suspects and also published a preliminary report of the investigation. This malware is notable due to the targeting of Italian celebrities and politicians. We conducted our analysis on one of […]
Tech-Channel – 1Password #20
Tech-Channel – 1Password #20 Sichere Passwörter sind für viele Nutzer eine Herausforderung. Wie merke ich mir kryptische Daten? Wie werde ich der Menge an unterschiedlichen Passwörtern für jede Anwendung und jeden Login Herr? Heute stellen wir ein hilfreiches Werkzeug für fast alle Plattformen vor. 1Password speichert gecryptet die verschiedenen Anmeldungen, sichere Notizen, Software Lizenz-Keys, u.v.m. […]
Matryoshka Doll Reconnaissance Framework
By Talos Group This post authored by David Maynor & Paul Rascagneres with the contribution of Alex McDonnell and Matthew Molyett Overview Talos has identified a malicious Microsoft Word document with several unusual features and an advanced workflow, performing reconnaissance on the targeted system to avoid sandbox detection and virtual analysis, as well as exploitation […]
Matryoshka Doll Reconnaissance Framework
By Talos Group This post authored by David Maynor & Paul Rascagneres with the contribution of Alex McDonnell and Matthew Molyett Overview Talos has identified a malicious Microsoft Word document with several unusual features and an advanced workflow, performing reconnaissance on the targeted system to avoid sandbox detection and virtual analysis, as well as exploitation […]

