Protecting Privacy Build Trust

Protecting Privacy Build Trust
  • Contact Us

Uncategorized

on May 14, 2026 at 4:02 pm — Ongoing exploitation of Cisco Catalyst SD-WAN vulnerabilities 

Cisco Talos is tracking the active exploitation of CVE-2026-20182, an authentication bypass vulnerability in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage. Successful exploitation of CVE-2026-20182 allows an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. The exploitation of CVE-2026-20182 appears to […]

on May 14, 2026 at 4:02 pm — Ongoing exploitation of Cisco Catalyst SD-WAN vulnerabilities  Read More »

on April 23, 2026 at 3:10 pm — UAT-4356’s Targeting of Cisco Firepower Devices 

Cisco Talos is aware of UAT-4356‘s continued active targeting of Cisco Firepower devices’ Firepower eXtensible Operating System (FXOS). UAT-4356 exploited n-day vulnerabilities (CVE-2025-20333 and CVE-2025-20362) to gain unauthorized access to vulnerable devices, where the threat actor deployed their custom-built backdoor dubbed “FIRESTARTER.” FIRESTARTER considerably overlaps with the technical capabilities of RayInitiator’s Stage 3 shellcode that

on April 23, 2026 at 3:10 pm — UAT-4356’s Targeting of Cisco Firepower Devices  Read More »

on April 3, 2026 at 5:00 pm — Axios NPM supply chain incident 

Cisco Talos is actively investigating the March 31, 2026 supply chain attack on the official Axios node package manager (npm) package during which two malicious versions (v1.14.1 and v0.30.4) were deployed. Axios is one of the more popular JavaScript libraries with as many as 100 million downloads per week. Axios is a widely-deployed HTTP client

on April 3, 2026 at 5:00 pm — Axios NPM supply chain incident  Read More »

on March 3, 2026 at 12:55 am — Update, March 10: Talos on the developing situation in the Middle East 

Update History   Date Description of Updates March 10, 2026 Updated guidance and recommendations, IOCs and timelines. March 2, 2026 Initial Blog Blog update: March 10, 2026 Executive summary On Feb. 28, 2026, the United States and Israel launched coordinated strikes against Iranian military and leadership targets, prompting Iranian missile and drone retaliation across the

on March 3, 2026 at 12:55 am — Update, March 10: Talos on the developing situation in the Middle East  Read More »

on February 25, 2026 at 4:13 pm — Active exploitation of Cisco Catalyst SD-WAN by UAT-8616 

Cisco Talos is tracking the active exploitation of CVE-2026-20127, a vulnerability in Cisco Catalyst SD-WAN Controller, formerly vSmart, that allows an unauthenticated remote attacker to bypass authentication and obtain administrative privileges on the affected system by sending a crafted request to an affected system. Successful exploitation may allow the attacker to gain administrative privileges on

on February 25, 2026 at 4:13 pm — Active exploitation of Cisco Catalyst SD-WAN by UAT-8616  Read More »

on February 11, 2026 at 12:00 am — New threat actor, UAT-9921, leverages VoidLink framework in campaigns 

Cisco Talos recently discovered a new threat actor, UAT-9221, leveraging VoidLink in campaigns. Their activities may go as far back as 2019, even without VoidLink. The VoidLink compile-on-demand feature lays down the foundations for AI-enabled attack frameworks, which can create tools on-demand for their operators. Cisco Talos found clear indications that implants also exist for

on February 11, 2026 at 12:00 am — New threat actor, UAT-9921, leverages VoidLink framework in campaigns  Read More »

on December 17, 2025 at 4:55 pm — UAT-9686 actively targets Cisco Secure Email Gateway and Secure Email and Web Manager 

·       Cisco Talos recently discovered a campaign targeting Cisco AsyncOS Software for Cisco Secure Email Gateway, formerly known as Cisco Email Security Appliance (ESA), and Cisco Secure Email and Web Manager, formerly known as Cisco Content Security Management Appliance (SMA). ·       We assess with moderate confidence that the adversary, who we are tracking as UAT-9686,

on December 17, 2025 at 4:55 pm — UAT-9686 actively targets Cisco Secure Email Gateway and Secure Email and Web Manager  Read More »

on August 20, 2025 at 1:00 pm — Russian state-sponsored espionage group Static Tundra compromises unpatched end-of-life network devices 

Static Tundra is a Russian state-sponsored cyber espionage group linked to the FSB’s Center 16 unit that has been operating for over a decade, specializing in compromising network devices for long-term intelligence gathering operations. The group actively exploits a seven-year-old vulnerability (CVE-2018-0171), which was patched at the time of the vulnerability publications, in Cisco IOS

on August 20, 2025 at 1:00 pm — Russian state-sponsored espionage group Static Tundra compromises unpatched end-of-life network devices  Read More »

on July 21, 2025 at 8:33 pm — ToolShell: Details of CVEs Affecting SharePoint Servers 

Cisco Talos is aware of the ongoing exploitation of CVE-2025-53770 and CVE-2025-53771 in the wild. These are path traversal vulnerabilities affecting SharePoint Server Subscription Edition, SharePoint Server 2016, and SharePoint Server 2019. According to Microsoft, these vulnerabilities do not affect SharePoint Online in Microsoft 365 and only apply to on-premises SharePoint servers.   Microsoft has also

on July 21, 2025 at 8:33 pm — ToolShell: Details of CVEs Affecting SharePoint Servers  Read More »

on July 17, 2025 at 10:00 am — MaaS operation using Emmenhtal and Amadey linked to threats against Ukrainian entities 

In April 2025 Cisco Talos identified a Malware-as-a-Service (MaaS) operation that utilized Amadey to deliver payloads.  The MaaS operators used fake GitHub accounts to host payloads, tools and Amadey plug-ins, likely as an attempt to bypass web filtering and for ease of use.   Several operator tactics, techniques and procedures (TTPs) overlap with a SmokeLoader phishing

on July 17, 2025 at 10:00 am — MaaS operation using Emmenhtal and Amadey linked to threats against Ukrainian entities  Read More »