You searched for Talos | SC Media

Your search for Talos returned 30 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Cybercrime remove

Your search for Talos returned 30 results

Sort Results:

Relevant Recent
FacebookTransparency
Cybercrime, Security News

74 Facebook groups for cybercriminals found

There are Facebooks groups for moms, people who like trains, or old photographs of Chicago so it should come as no surprise that cybercriminals also use the social media network to discuss what they like. Cisco Talos found 74 Facebook groups with more than 385,000 members with dedicated to acts ranging from shady to illegal.…
APTs/cyberespionage, Cybercrime, Security News

Sea Turtle DNS hijackers linked to breach of Greece’s ccTLD organization

Despite being publicly exposed earlier this year, the actors behind the malicious Sea Turtle DNS hijacking campaign continue to unabashedly rack up new victims, and apparently added a new technique to their repertoire, a new report states. The group made waves last April when researchers at Cisco’s Talos unit reported that the attackers have been…
Cybercrime, Security News

Sextortion gang found to be behind email bomb threat spree

Cisco Talos believes it has tied a recent wave of emailed bomb threats to the same group that was conducting a sextortion campaign earlier this year, and revealed that most recent campaign was a financial bust for the malicious actors. A nationwide wave of bomb threat emails demanding a bitcoin payment to halt the explosion…
APTs/cyberespionage, Cybercrime, Malware, Phishing, Security News

Phishing campaign targeted subscribers to Tibetan Government-in-Exile’s mailing list

Subscribers to a Tibetan Government-in-Exile mailing list were targeted in a recent email-based phishing campaign designed to infect them with a remote access trojan. Dubbed ExileRAT, the trojan is capable of gathering system information, retrieving and pushing files, and executing and ending various processes, according to a blog post from Cisco Systems’ Talos division, whose…
BankingTrojan
Cybercrime, Security News

Recently found GPlayed trojan spinoff analyzed

The GPlayed trojan that was only revealed earlier this month has already spawned a successor that is capable of targeting the customers of a specific Russian bank. Dubbed by Cisco Talos GPlayed Banker, the trojan has been specialized to just target customers of the Sberbank AutoPay users. The initial version, which Talos detailed in an…
The first half of 2013 saw a 355 percent uptick in social spam. Facebook is a big target.
Cybercrime, Email Security, Government, Malware, Phishing, Security News

Renewed Emotet phishing activity targets UN, government and military users

Since resuming operations after a holiday hiatus, the malicious actors behind the Emotet banking trojan network have reportedly targeted at least 82 countries with spam and crafted a special phishing campaign targeting the United Nations. Meanwhile, an additional report has revealed an increase in Emotet phishing activity targeting government and military entities over the last…
Turkey main
Cybercrime, Malware, Phishing, Security News

Attackers use evolved code injection technique to target Turkey with Adwind RAT

A new spam campaign that debuted last August is attempting to infect Turkish targets with the Adwind 3.0 remote access tool, using a previously undiscovered variant of a code injection attack that exploits Microsoft’s Dynamic Data Exchange (DDE) data transfer protocol. A key improvement to this variant is that it features new techniques to avoid anti-malware software…
Cybercrime, Malware, Ransomware, Security News, Vulnerabilities

New Sodinokibi ransomware delivered via Oracle WebLogic vulnerability

A remotely exploitable vulnerability in the Oracle WebLogic Server is currently the attack vector of choice for malicious actors to deliver a newly discovered ransomware called Sodinokibi. Sokinokibi encrypts data found in the user directory and leverages the Microsoft Windows vssadmin.exe utility to delete any “shadow copies” (created by default back-up mechanisms) in order to…
Next post in Security News