Cisco Talos Intelligence Blog

Cisco Systems, Inc.
Cisco Talos Blog
  • Software
  • Vulnerability Information
    • Vulnerability Information

    • Vulnerability Reports
    • Microsoft Advisories
  • Reputation Center
    • Reputation Center

    • IP & Domain Reputation
    • Talos File Reputation
    • Secure Endpoint Naming Conventions
    • Intelligence Categories
  • Library
  • Support
  • Incident Response
  • Careers
  • Blog
    • Blog

    • Talos Blog
    • Talos Threat Source Newsletter
  • Podcasts
    • Podcasts

    • Beers with Talos
    • Talos Takes
  • About

The sights and sounds from the Talos Threat Research Summit

By Jonathan Munshaw

Monday, June 10, 2019 10:06
ransomware
Share this post

Related Content

What Cisco Talos knows about the Rhysida ransomware

August 8, 2023 15:08

The group appears to commonly deploy double extortion — of the victims that have been listed on the leak site, several of them have had some portion of their exfiltrated data exposed.

New threat actor targets Bulgaria, China, Vietnam and other countries with customized Yashma ransomware

August 7, 2023 08:08

Cisco Talos discovered an unknown threat actor, seemingly of Vietnamese origin, conducting a ransomware operation that began at least as early as June 4, 2023 with customized Yashma ransomware.

Active exploitation of the MOVEit Transfer vulnerability — CVE-2023-34362 — by Clop ransomware group

June 16, 2023 14:06

The Clop ransomware group has claimed responsibility for exploiting the vulnerability to deploy a previously unseen web shell, LemurLoot.

  • Software
  • Reputation Center
  • Vulnerability Inforamtion
  • Microsoft Advisory Snort Rules
  • Incident Response
  • Secure Endpoint Naming Conventions
  • Talos File Reputation
  • Library
  • Support Communities
  • About
  • Careers
  • Talos Blog
  • Threat Source newsletters
  • Beers with Talos Podcast
  • Talos Takes Podcast
Connect with us
  • Follow us on Twitter
  • Watch our informational videos on YouTube
  • Connect with us on LinkedIn
Cisco Security

© Cisco Systems, Inc. and/or its affiliates. All rights reserved. View our Privacy Policy