Cisco Talos Intelligence Blog

Cisco Systems, Inc.
Cisco Talos Blog
  • Software
  • Vulnerability Information
    • Vulnerability Information

    • Vulnerability Reports
    • Microsoft Advisories
  • Reputation Center
    • Reputation Center

    • IP & Domain Reputation
    • Talos File Reputation
    • Secure Endpoint Naming Conventions
    • Intelligence Categories
  • Library
  • Support
  • Incident Response
  • Careers
  • Blog
    • Blog

    • Talos Blog
    • Talos Threat Source Newsletter
  • Podcasts
    • Podcasts

    • Beers with Talos
    • Talos Takes
  • About

Threat Source newsletter (June 27, 2019)

By Jonathan Munshaw

Thursday, June 27, 2019 14:06
Threat Source newsletter
Share this post

Related Content

What’s the point of press releases from threat actors?

September 21, 2023 14:09

It reads as if ALPHV really wants to come across as the “good guys” in this case, but I’m not sure who outside of dark web circles would be willing to feel sorry for them.

Turns out even the NFL is worried about deepfakes

September 14, 2023 14:09

With the popularity of pay-for-shoutout services like Cameo, it’d be fairly easy for someone to develop a convincing enough deepfake of a player and try to steal someone’s money by saying they could prank their fantasy football league for $50.

A secondhand account of the worst possible timing for a scammer to strike

September 7, 2023 14:09

Cybercriminals are abusing Advanced Installer, a legitimate Windows tool used for creating software packages, to drop cryptocurrency-mining malware on infected machines, new Cisco Talos research shows.

  • Software
  • Reputation Center
  • Vulnerability Inforamtion
  • Microsoft Advisory Snort Rules
  • Incident Response
  • Secure Endpoint Naming Conventions
  • Talos File Reputation
  • Library
  • Support Communities
  • About
  • Careers
  • Talos Blog
  • Threat Source newsletters
  • Beers with Talos Podcast
  • Talos Takes Podcast
Connect with us
  • Follow us on Twitter
  • Watch our informational videos on YouTube
  • Connect with us on LinkedIn
Cisco Security

© Cisco Systems, Inc. and/or its affiliates. All rights reserved. View our Privacy Policy