Threat Source newsletter for Oct. 8, 2020

Threat Source newsletter for Oct. 8, 2020

 


Newsletter compiled by Jon Munshaw.
Good afternoon, Talos readers. 
We’ve been writing and talking about election security a ton lately. And as the U.S. presidential election draws closer, we decided it was time to summarize some things. So, we released this blog post with our formal recommendations for voters and how they can avoid disinformation and other bad actors trying to influence the election.  Our researchers are also following the development of the PoetRAT malware. This remote access trojan is still targeting public and private entities in Azerbaijan, and we’ve seen the actor behind the threat make several tweaks over time to make it more agile and difficult to detect.  If vulnerability research is more your thing, we also have a deep dive into our work discovering bugs in Microsoft Azure Sphere as part of a challenge from Microsoft. In all, we disclosed 16 vulnerabilities. Here’s what you need to know about them and how to stay protected. 

UPCOMING PUBLIC ENGAGEMENTS 

Location: CS3STHLM Virtual 
Date: Oct. 22 
Speakers: Kelly Leaschner 
Synopsis: As more devices are becoming cloud-connected, it is important to understand how this attack surface is different from traditional, socket-based server applications. There is no open port listening with a cloud-connected application, so there is additional work required in order to just get the application to accept attacker-controlled data. This talk will walk through the initial steps necessary to begin vulnerability research on this application. Cloud-based control of physical devices ha ..

Support the originator by clicking the read the rest link below.