Black Hat Europe 2017: Malware Analysis in the SOC

By Jessica Bair New Cisco Threat Grid dashboard yields faster malware analysis and response Black Hat Europe kicked off just after the X Factor series finale was recorded live at the London ExCel Center, briefly mixing the Network Operations Centre (NOC) and Security Operations Centre (SOC) staff with hordes of teenaged fans. A few team members confessed to […]

Source:: Cisco Security Notice

Vulnerability Spotlight: TALOS-2017-0393 / CVE-2017-2886 – ACDSee Ultimate 10 Remote Code Execution Vulnerability

By Talos Group Overview Talos has discovered a remote code execution vulnerability in the ACDSee Ultimate 10 application from ACD Systems International Inc. Exploiting this vulnerabilities can potentially allow an attacker to gain full control over the victim’s machine. If an attacker builds a specially crafted .PSD (Photoshop) file and the victim opens it with the ACDSee Ultimate […]

Source:: Cisco Security Notice

Vulnerability Spotlight: TALOS-2017-0393 / CVE-2017-2886 – ACDSee Ultimate 10 Remote Code Execution Vulnerability

By Talos Group Overview Talos has discovered a remote code execution vulnerability in the ACDSee Ultimate 10 application from ACD Systems International Inc. Exploiting this vulnerabilities can potentially allow an attacker to gain full control over the victim’s machine. If an attacker builds a specially crafted .PSD (Photoshop) file and the victim opens it with the ACDSee Ultimate […]

Source:: Cisco Security Notice

The Mutiny Fuzzing Framework and Decept Proxy

By Talos Group This blog post is authored by James Spadaro of Cisco ASIG and Lilith Wyatt of Cisco Talos. Imagine a scenario where you, as a vulnerability researcher, are tasked with auditing a network application to identify vulnerabilities. By itself, the task may not seem too daunting until you learn of a couple conditions and constraints: you […]

Source:: Cisco Security Notice

The Mutiny Fuzzing Framework and Decept Proxy

By Talos Group This blog post is authored by James Spadaro of Cisco ASIG and Lilith Wyatt of Cisco Talos. Imagine a scenario where you, as a vulnerability researcher, are tasked with auditing a network application to identify vulnerabilities. By itself, the task may not seem too daunting until you learn of a couple conditions and constraints: you […]

Source:: Cisco Security Notice

Cisco Cloudlock joins the Box Trust ecosystem

By Russell Miller We live in an age where technology is core to business and can impact success. Staying competitive requires adopting and adapting to new technology. Direct correlation can be drawn to the pace of innovation and collaboration among teams. Companies spend billions of dollars every year to implement solutions that help teams collaborate faster, easier, and […]

Source:: Cisco Security Notice

Cisco Cloudlock joins the Box Trust ecosystem

By Russell Miller We live in an age where technology is core to business and can impact success. Staying competitive requires adopting and adapting to new technology. Direct correlation can be drawn to the pace of innovation and collaboration among teams. Companies spend billions of dollars every year to implement solutions that help teams collaborate faster, easier, and […]

Source:: Cisco Security Notice

Recam Redux – DeConfusing ConfuserEx

By Talos Group Overview This report shows how to deobfuscate a custom .NET ConfuserEx protected malware. We identified this recent malware campaign from our Advanced Malware Protection (AMP) telemetry. Initial infection is via a malicious Word document, the malware ultimately executes in memory an embedded payload from the Recam family. Recam is an information stealer. Although the malware […]

Source:: Cisco Security Notice

Recam Redux – DeConfusing ConfuserEx

By Talos Group Overview This report shows how to deobfuscate a custom .NET ConfuserEx protected malware. We identified this recent malware campaign from our Advanced Malware Protection (AMP) telemetry. Initial infection is via a malicious Word document, the malware ultimately executes in memory an embedded payload from the Recam family. Recam is an information stealer. Although the malware […]

Source:: Cisco Security Notice

You already own the most powerful security tool. Are you really using it? Really?

By Dan Stotts See and stop threats using your existing network. If you live in the United States, there’s a 44% chance your most valuable personal data were recently compromised[1]. The silver lining, if there is one, is that this breach compelled many to start actively monitoring their credit report for signs of suspicious activity. It often takes […]

Source:: Cisco Security Notice