Protecting Privacy Build Trust

Protecting Privacy Build Trust
  • Contact Us

Uncategorized

on March 3, 2026 at 12:55 am — Update, March 10: Talos on the developing situation in the Middle East 

Update History   Date Description of Updates March 10, 2026 Updated guidance and recommendations, IOCs and timelines. March 2, 2026 Initial Blog Blog update: March 10, 2026 Executive summary On Feb. 28, 2026, the United States and Israel launched coordinated strikes against Iranian military and leadership targets, prompting Iranian missile and drone retaliation across the […]

on March 3, 2026 at 12:55 am — Update, March 10: Talos on the developing situation in the Middle East  Read More »

on February 25, 2026 at 4:13 pm — Active exploitation of Cisco Catalyst SD-WAN by UAT-8616 

Cisco Talos is tracking the active exploitation of CVE-2026-20127, a vulnerability in Cisco Catalyst SD-WAN Controller, formerly vSmart, that allows an unauthenticated remote attacker to bypass authentication and obtain administrative privileges on the affected system by sending a crafted request to an affected system. Successful exploitation may allow the attacker to gain administrative privileges on

on February 25, 2026 at 4:13 pm — Active exploitation of Cisco Catalyst SD-WAN by UAT-8616  Read More »

on February 11, 2026 at 12:00 am — New threat actor, UAT-9921, leverages VoidLink framework in campaigns 

Cisco Talos recently discovered a new threat actor, UAT-9221, leveraging VoidLink in campaigns. Their activities may go as far back as 2019, even without VoidLink. The VoidLink compile-on-demand feature lays down the foundations for AI-enabled attack frameworks, which can create tools on-demand for their operators. Cisco Talos found clear indications that implants also exist for

on February 11, 2026 at 12:00 am — New threat actor, UAT-9921, leverages VoidLink framework in campaigns  Read More »

on December 17, 2025 at 4:55 pm — UAT-9686 actively targets Cisco Secure Email Gateway and Secure Email and Web Manager 

·       Cisco Talos recently discovered a campaign targeting Cisco AsyncOS Software for Cisco Secure Email Gateway, formerly known as Cisco Email Security Appliance (ESA), and Cisco Secure Email and Web Manager, formerly known as Cisco Content Security Management Appliance (SMA). ·       We assess with moderate confidence that the adversary, who we are tracking as UAT-9686,

on December 17, 2025 at 4:55 pm — UAT-9686 actively targets Cisco Secure Email Gateway and Secure Email and Web Manager  Read More »

on August 20, 2025 at 1:00 pm — Russian state-sponsored espionage group Static Tundra compromises unpatched end-of-life network devices 

Static Tundra is a Russian state-sponsored cyber espionage group linked to the FSB’s Center 16 unit that has been operating for over a decade, specializing in compromising network devices for long-term intelligence gathering operations. The group actively exploits a seven-year-old vulnerability (CVE-2018-0171), which was patched at the time of the vulnerability publications, in Cisco IOS

on August 20, 2025 at 1:00 pm — Russian state-sponsored espionage group Static Tundra compromises unpatched end-of-life network devices  Read More »

on July 21, 2025 at 8:33 pm — ToolShell: Details of CVEs Affecting SharePoint Servers 

Cisco Talos is aware of the ongoing exploitation of CVE-2025-53770 and CVE-2025-53771 in the wild. These are path traversal vulnerabilities affecting SharePoint Server Subscription Edition, SharePoint Server 2016, and SharePoint Server 2019. According to Microsoft, these vulnerabilities do not affect SharePoint Online in Microsoft 365 and only apply to on-premises SharePoint servers.   Microsoft has also

on July 21, 2025 at 8:33 pm — ToolShell: Details of CVEs Affecting SharePoint Servers  Read More »

on July 17, 2025 at 10:00 am — MaaS operation using Emmenhtal and Amadey linked to threats against Ukrainian entities 

In April 2025 Cisco Talos identified a Malware-as-a-Service (MaaS) operation that utilized Amadey to deliver payloads.  The MaaS operators used fake GitHub accounts to host payloads, tools and Amadey plug-ins, likely as an attempt to bypass web filtering and for ease of use.   Several operator tactics, techniques and procedures (TTPs) overlap with a SmokeLoader phishing

on July 17, 2025 at 10:00 am — MaaS operation using Emmenhtal and Amadey linked to threats against Ukrainian entities  Read More »

on June 5, 2025 at 10:00 am — Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine 

Cisco Talos observed a destructive attack on a critical infrastructure entity within Ukraine, using a previously unknown wiper we are calling “PathWiper”.  The attack was instrumented via a legitimate endpoint administration framework, indicating that the attackers likely had access to the administrative console, that was then used to issue malicious commands and deploy PathWiper across

on June 5, 2025 at 10:00 am — Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine  Read More »

on May 22, 2025 at 10:00 am — UAT-6382 exploits Cityworks zero-day vulnerability to deliver malware 

Cisco Talos has observed exploitation of CVE-2025-0994, a remote-code-execution vulnerability in Cityworks, a popular asset management system.   The Cybersecurity and Infrastructure Security Agency (CISA) and Trimble have both released advisories pertaining to this vulnerability, with Trimble’s advisory specifically listing indicators of compromise (IOCs) related to the intrusion exploiting the CVE.   IOCs pertaining to intrusions discovered

on May 22, 2025 at 10:00 am — UAT-6382 exploits Cityworks zero-day vulnerability to deliver malware  Read More »