Barbervisor: Journey developing a snapshot fuzzer with Intel VT-x

One of the ways vulnerability researchers find bugs is with fuzzing. At a high level, fuzzing is the process of generating and mutating random inputs for a given target to crash it. In 2017, I started developing a bare metal hypervisor for the purposes of snapshot fuzzing: fuzzing small subsets of programs from a known,…

Read on...

Accelerate Business Resiliency with a Custom Strategy and Roadmap

Co-author: John Milstead   There’s no doubt the COVID-19 pandemic has created uncertainty. Yet businesses have been attuning and adjusting to the new normal of remote work and virtual collaboration. Some are gearing up for getting back to workspaces while adhering to new health and safety protocols such as social distancing. All in all, this…

Read on...

Rushing into New Opportunities: The Innovation Pipeline

My name is Rashmi – pronounced like Rush-Me. And my name seems to fit me as I love to RUSH into new opportunities. One of which was Cisco’s Innovation Pipeline – this was a dream opportunity for me! Overall, I organized the event planning, coordinated with organizers and participants, and applied my basic instincts of…

Read on...

One graph to rule them all – Inside GOV.UK

Last year was a big year for data science on GOV.UK, as we formed GOV.UK Data Labs and deployed our first machine learning model to production. This model automatically recommends content to users on the site based on which page they are on – quite similar to how you might get recommended a new show…

Read on...

Threat Roundup for July 31 to August 7

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 31 and August 7. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are…

Read on...

Preparing for the Unpredictable: Imagining a Data Security and Privacy Platform

With stricter privacy regulations, evolving customer expectations, and growing work-from-home demands, organizations need a simple way to know, see, and manage their data. Luckily, we’ve got a few ideas.  Security is all about the data. Protecting data is the reason companies invest in security infrastructure and services like threat detection, data loss prevention, strong multi-factor…

Read on...