EyePyramid: An Archaeological Journey

By Talos Group The few last days, a malware sample named EyePyramid has received considerable attention, especially in Italy. The Italian police have arrested two suspects and also published a preliminary report of the investigation. This malware is notable due to the targeting of Italian celebrities and politicians. We conducted our analysis on one of […]

Tech-Channel – 1Password #20

Tech-Channel – 1Password #20 Sichere Passwörter sind für viele Nutzer eine Herausforderung. Wie merke ich mir kryptische Daten? Wie werde ich der Menge an unterschiedlichen Passwörtern für jede Anwendung und jeden Login Herr? Heute stellen wir ein hilfreiches Werkzeug für fast alle Plattformen vor. 1Password speichert gecryptet die verschiedenen Anmeldungen, sichere Notizen, Software Lizenz-Keys, u.v.m. […]

Matryoshka Doll Reconnaissance Framework

By Talos Group This post authored by David Maynor & Paul Rascagneres with the contribution of Alex McDonnell and Matthew Molyett Overview Talos has identified a malicious Microsoft Word document with several unusual features and an advanced workflow, performing reconnaissance on the targeted system to avoid sandbox detection and virtual analysis, as well as exploitation […]

Matryoshka Doll Reconnaissance Framework

By Talos Group This post authored by David Maynor & Paul Rascagneres with the contribution of Alex McDonnell and Matthew Molyett Overview Talos has identified a malicious Microsoft Word document with several unusual features and an advanced workflow, performing reconnaissance on the targeted system to avoid sandbox detection and virtual analysis, as well as exploitation […]

How to Improve Privacy as a Component of Your Cyber Governance Program

By Steven Ransom-Jones Many businesses are looking to reap the benefits of digital transformation, evolving new services that provide value to and forge closer relationships with partners and customers. Trust and responsible information management practices are becoming business differentiators as consumers become more aware of the impact of data breaches and the potential for misuse […]

How to Improve Privacy as a Component of Your Cyber Governance Program

By Steven Ransom-Jones Many businesses are looking to reap the benefits of digital transformation, evolving new services that provide value to and forge closer relationships with partners and customers. Trust and responsible information management practices are becoming business differentiators as consumers become more aware of the impact of data breaches and the potential for misuse […]

Keeping Up with Security Vulnerability Disclosures with the Cisco PSIRT openVuln API

By Omar Santos The Cisco PSIRT openVuln API is a RESTful API that allows customers to obtain Cisco security vulnerability information in different machine-consumable formats. It supports industrywide security standards such as the Common Vulnerability Reporting Framework (CVRF), Open Vulnerability and Assessment Language (OVAL), Common Vulnerability and Exposure (CVE) identifiers, Common Weakness Enumeration (CWE), and […]