Read the original article: Cisco and Amazon Web Services (AWS) Work Together to Accelerate Cloud Adoption Cisco enables customers to protect data, applications and workloads deployed in AWS, supporting the AWS Shared Responsibility Model, and providing scalable, advanced security with…
Category: Security – Cisco Blogs
Get a compliant “Cloud Smart” approach to security with Stealthwatch Cloud
Read the original article: Get a compliant “Cloud Smart” approach to security with Stealthwatch Cloud US Public Sector customers can now secure sensitive workloads and meet regulatory standards with Stealthwatch Cloud in AWS GovCloud The post Get a compliant “Cloud…
SMB Cybersecurity: The Real Benefits of a Top-Down Approach
Read the original article: SMB Cybersecurity: The Real Benefits of a Top-Down Approach In a recent #CiscoChat, Hazel Burton interviews Advisory CISO Wolf Goerlich and Elevate Security co-founder Masha Sedova to discuss some SMB security myths and the importance of…
Application-Based Micro-Segmentation, Reimagined for the Hybrid Cloud World
Read the original article: Application-Based Micro-Segmentation, Reimagined for the Hybrid Cloud World Leading analyst at Omdia Research writes a whitepaper on how Cisco Tetration can secure all of the hybrid cloud journey The post Application-Based Micro-Segmentation, Reimagined for the Hybrid…
Threat Spotlight: Valak Slithers Its Way Into Manufacturing and Transportation Networks
Read the original article: Threat Spotlight: Valak Slithers Its Way Into Manufacturing and Transportation Networks By Nick Biasini, Edmund Brumaghin and Mariano Graziano. Threat summary Attackers are actively distributing the Valak malware family around the globe, with enterprises, in particular,…
Introducing Cisco AMP for Endpoints – Premier
Read the original article: Introducing Cisco AMP for Endpoints – Premier We are excited to announce the availability AMP for Endpoints Premier package which includes our SecureX Threat Hunting feature. With AMP for Endpoints Premier, organizations can add an active,…
Under the Hood of a Security Platform
Read the original article: Under the Hood of a Security Platform June marks the general availability of Cisco SecureX. Let’s take a look under the hood as the industry learns to define what we should all expect from a security…
PROMETHIUM extends global reach with StrongPity3 APT
Read the original article: PROMETHIUM extends global reach with StrongPity3 APT The PROMETHIUM threat actor — active since 2012 — has been exposed multiple times over the past several years.. However, this has not deterred this actor from continuing and…
Post-Quantum TLS 1.3 and SSH Performance (preliminary results)
Read the original article: Post-Quantum TLS 1.3 and SSH Performance (preliminary results) So far, the industry has been testing post-quantum key exchange and authentication separately in a quest for a quantum-secure future. We recently have been experimenting with TLS and…
Threat Roundup for June 19 to June 26
Read the original article: Threat Roundup for June 19 to June 26 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between June 19 and June 26. As with previous roundups, this post isn’t meant to…
Ripple20: Critical Vulnerabilities Might be Putting Your IoT/OT Devices at Risk
Read the original article: Ripple20: Critical Vulnerabilities Might be Putting Your IoT/OT Devices at Risk Ripple20 are critical vulnerabilities targeting IoT and OT assets. Learn how Cisco Cyber Vision and ISA3000 can help you detect them and protect your industrial…
When it comes to security, how many vendors is too many?
Read the original article: When it comes to security, how many vendors is too many? If you’re like many other organizations today, you’re getting inundated with alerts, have too many interfaces to pay attention to, and wish to secure your…
Why you should consider Stealthwatch to monitor your expanding network
Read the original article: Why you should consider Stealthwatch to monitor your expanding network As networks expand, Cisco Stealthwatch has been recognized as the leading network security analytics solution due to its scalability, comprehensive visibility, and industry leading Encrypted Traffic…
Why you should consider Stealthwatch to monitor the expanding network?
Read the original article: Why you should consider Stealthwatch to monitor the expanding network? As networks expand, Cisco Stealthwatch has been recognized as the leading network security analytics solution due to its scalability, comprehensive visibility, and industry leading Encrypted Traffic…
Threat Roundup for June 5 to June 12
Read the original article: Threat Roundup for June 5 to June 12 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between June 5 and June 12. As with previous roundups, this post isn’t meant to…
Choosing the right security analytics solution as networks expand: competitive considerations and customer validation
Read the original article: Choosing the right security analytics solution as networks expand: competitive considerations and customer validation As networks expand, Cisco Stealthwatch has been recognized as the leading network security analytics solution due to its scalability, comprehensive visibility, and…
The impact of a diverse cybersecurity team
Read the original article: The impact of a diverse cybersecurity team In the latest episode of the Security Stories podcast, we meet the wonderful Marene Allison. She will shortly be celebrating her ten year anniversary as Vice President and CISO…
IndigoDrop spreads via military-themed lures to deliver Cobalt Strike
Read the original article: IndigoDrop spreads via military-themed lures to deliver Cobalt Strike By Asheer Malhotra. Cisco Talos has observed a malware campaign that utilizes military-themed malicious Microsoft Office documents (maldocs) to spread Cobalt Strike beacons containing full-fledged RAT capabilities.…
Getting more value from your endpoint security tool #3: Querying Tips for Incident Investigation
Read the original article: Getting more value from your endpoint security tool #3: Querying Tips for Incident Investigation Cisco Orbital Advanced Search has an entire category dedicated to Forensics, which contains queries to collect data such as installed programs on…
Addressing the Challenges of Cloud Email Infrastructures
Read the original article: Addressing the Challenges of Cloud Email Infrastructures Cloud email platforms increase productivity and reduce cost but can present their own set of challenges. Read how Cisco’s Cloud Mailbox Defense addresses those challenges head on. The post…
Cisco SecureX: Security for the Accelerated IT Agenda
Read the original article: Cisco SecureX: Security for the Accelerated IT Agenda With Cisco SecureX we wanted to transform security with a platform that would give customers the best protection and a simple user experience. This has never been more…
Delivering Security That is Effective and Simple – That’s No Easy Feat
Read the original article: Delivering Security That is Effective and Simple – That’s No Easy Feat We’re incredibly proud to unleash SecureX on the security market and we’re continuing to innovate in the products that underline SecureX being the broadest…
Simplify to Secure: Reduce Complexity by Integrating Your Security Ecosystem
Read the original article: Simplify to Secure: Reduce Complexity by Integrating Your Security Ecosystem In the new Cisco Cybersecurity Report ‘Simplify to Secure’, we use data-driven insights to show the benefits of how a platform approach to security can transform…
World, Meet Cisco Secure
Read the original article: World, Meet Cisco Secure Cisco Secure offers business and security architecture collaboration, freeing your workforce to focus valuable time and energy on objectives that really matter. Empowering you to focus more on opportunities. The post World,…
Threat Roundup for May 29 to June 5
Read the original article: Threat Roundup for May 29 to June 5 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between May 29 and June 5. As with previous roundups, this post isn’t meant to…
Umbrella with SecureX built-in: Coordinated Protection
Read the original article: Umbrella with SecureX built-in: Coordinated Protection Cisco SecureX connects the breadth of Cisco’s integrated security portfolio – including Umbrella– and your other security tools for a consistent experience that unifies visibility, enables automation, and strengthens your…
Threat Roundup for May 22 to May 29
Read the original article: Threat Roundup for May 22 to May 29 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between May 22 and May 29. As with previous roundups, this post isn’t meant to…
People Are The Strongest Link
Read the original article: People Are The Strongest Link Our special guest on the Security Stories podcast this week is Brian Honan, the founder and CEO of IRISS; Ireland’s first Computer Emergency Response Team. Our chat includes talking about managing…
3 reasons why Cisco Stealthwatch is the Michael Jordan of Network Traffic Analysis tools
Read the original article: 3 reasons why Cisco Stealthwatch is the Michael Jordan of Network Traffic Analysis tools Michael Jordan did it all on the court, was a more complete player in his later years, and stopped everything on defense.…
Cisco is Building a Bridge to Secure Access Service Edge
Read the original article: Cisco is Building a Bridge to Secure Access Service Edge SASE is a vision of a future secure networking model enterprises can use to adopt secure cloud computing. Cisco has been building a bridge to SASE…
The New Era of Business Continuity – What does it mean today?
Read the original article: The New Era of Business Continuity – What does it mean today? The term ‘business continuity’ has taken on a whole new meaning. It now extends beyond keeping the business running to helping your employees remain…
The Benefits, and Potential Challenges of, Cloud Email Platforms
Read the original article: The Benefits, and Potential Challenges of, Cloud Email Platforms Using cloud email platforms offers numerous opportunities for simplification and efficiency. It also comes with its own set of challenges. The post The Benefits, and Potential Challenges…
Dynamic Data Resolver (DDR) — IDA Plugin 1.0 beta
Read the original article: Dynamic Data Resolver (DDR) — IDA Plugin 1.0 beta Executive summary Static reverse-engineering in IDA can often be problematic. Certain values are calculated at run time, which makes it difficult to understand what a certain basic…
Remote work and the threat landscape
Read the original article: Remote work and the threat landscape This month, we decided to take a look at some of the trends we’ve seen in a shifting threat landscape, including attackers who are adapting their techniques to take advantage of new opportunities. When you understand what they’re doing,…
Cisco Remote Access VPN architecture for Amazon Web Services (AWS)
Read the original article: Cisco Remote Access VPN architecture for Amazon Web Services (AWS) This architecture covers DNS based load balancing for RAVPN connections for a single VPC (multi-az) and multi-VPC (multi-az) architecture. The post Cisco Remote Access VPN architecture…
Automated Threat Remediation in AWS with Stealthwatch Cloud
Read the original article: Automated Threat Remediation in AWS with Stealthwatch Cloud Stealthwatch Cloud customers often ask for remediation capabilities in the public cloud when threats are exposed. Find out how you can automatically remediate threats in AWS using Cisco…
Why Endpoint Security Matters in Protecting Remote Workers – Part 1
Read the original article: Why Endpoint Security Matters in Protecting Remote Workers – Part 1 Enabling your workforce to work securely on any endpoint, anywhere, is now more important than ever. See our customer’s thoughts on the value that AMP…
The Future of the Email Security Market: The Importance of the Secure Email Gateway
Read the original article: The Future of the Email Security Market: The Importance of the Secure Email Gateway Understanding the future of the email security market isn’t complete without a look at the importance of Secure Email Gateways and how…
Your Network Has Left the Building – How do you secure it?
Read the original article: Your Network Has Left the Building – How do you secure it? Today’s security teams have to mind various areas of their infrastructure, remote users and endpoints, and applications running everywhere in order to remain secure.…
Vulnerability Spotlight: Memory Corruption Vulnerability in GNU Glibc Leaves Smart Vehicles Open to Attack
Read the original article: Vulnerability Spotlight: Memory Corruption Vulnerability in GNU Glibc Leaves Smart Vehicles Open to Attack By Sam Dytrych and Jason Royes. Executive summary Modern automobiles are complex machines, merging both mechanical and computer systems under one roof.…
Go Agentless – Increase flexibility and prevent compromise from mobile devices in real time with ISE and Frontline.Clo …
Read the original article: Go Agentless – Increase flexibility and prevent compromise from mobile devices in real time with ISE and Frontline.Clo … Customers are ensuring mobile devices are safe, without agents and increasing flexibility while maintaining performance with Cisco…
Go Agentless – Increase flexibility and prevent comprise from mobile devices in real time with ISE and Frontline.Cloud
Read the original article: Go Agentless – Increase flexibility and prevent comprise from mobile devices in real time with ISE and Frontline.Cloud Customers are ensuring mobile devices are safe, without agents and increasing flexibility while maintaining performance with Cisco and…
Announcing Cisco Tetration SaaS Offering Available in Europe
Read the original article: Announcing Cisco Tetration SaaS Offering Available in Europe Tetration SaaS for workload security is now available in Europe. European enterprise, public sector or startup organizations now have a SaaS-based workload security solution, hosted in Europe. Take…
The Wolf Is Back…
Read the original article: The Wolf Is Back… Cisco Talos has discovered a new Android malware based on a leak of the DenDroid malware family. We named this malware “WolfRAT” due to strong links between this malware (and the command…
Endpoint Security from Cisco Earns High Marks in Independent Malware Protection Test
Read the original article: Endpoint Security from Cisco Earns High Marks in Independent Malware Protection Test Cisco Advanced Malware Protection (AMP) for Endpoints earned high marks in malware protection tests, while achieving the lowest false alarms in the first AV…
Threat Roundup for May 8 to May 15
Read the original article: Threat Roundup for May 8 to May 15 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between May 8 and May 15. As with previous roundups, this post isn’t meant to…
Tetration and AWS = Win-Win for Cloud and Workload Protection
Read the original article: Tetration and AWS = Win-Win for Cloud and Workload Protection Cloud providers like AWS offer many benefits – better capacity planning; rapid global application deployment. It’s the customer’s responsibility to secure their workloads. Inconsistent protection and…
Cisco Threat Response takes the leap with SecureX
Read the original article: Cisco Threat Response takes the leap with SecureX Are Threat Response and Cisco SecureX the same thing? Read how SecureX builds on Threat Response’s core aspects to simplify your security for greater efficiency across SecOps, NetOps,…
Firewalling and VPN in the Remote Work Era
Read the original article: Firewalling and VPN in the Remote Work Era The government is acknowledging that remote security solutions like VPN as well as cloud and workload firewalling are now more critical than ever. The post Firewalling and VPN…
“The security industry doesn’t have to be this way”. Talking people powered security with Masha Sedova
Read the original article: “The security industry doesn’t have to be this way”. Talking people powered security with Masha Sedova This Security Stories podcast episode features security entrepreneur Masha Sedova. We discuss how to create security awareness training that has…
Getting more value from your endpoint security tool #2: Querying Tips for security and IT operations
Read the original article: Getting more value from your endpoint security tool #2: Querying Tips for security and IT operations Cisco Orbital Advanced Search has an entire section of its Catalog dedicated to Threat Hunting, mapped to the MITRE ATT&CK™…
The KonMari Method: Sparking Joy with a Tidy Security Closet
Read the original article: The KonMari Method: Sparking Joy with a Tidy Security Closet With so many technologies cluttering your cybersecurity closet, how can you best strengthen your security? Can you get rid of complexity without compromising security? What if,…
Threat Spotlight: Astaroth – Maze of Obfuscation and Evasion Reveals Dark Stealer
Read the original article: Threat Spotlight: Astaroth – Maze of Obfuscation and Evasion Reveals Dark Stealer By Nick Biasini, Edmund Brumaghin and Nick Lister. Executive summary The threat landscape is littered with various malware families being delivered in a constant…
Threat Roundup for May 1 to May 8
Read the original article: Threat Roundup for May 1 to May 8 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 24 and May 1. As with previous roundups, this post isn’t meant to…
3 ways to put the expanding perimeter on ISE and gain zero-trust
Read the original article: 3 ways to put the expanding perimeter on ISE and gain zero-trust Read 3 ways ISE is taking on the expanding network perimeter and bringing zero trust into the workplace to solve secure access challenges. The…
Context is Everything When it Comes to Securing Application Access
Read the original article: Context is Everything When it Comes to Securing Application Access Cisco SecureX connects access controls across the workforce, workload, and workplace to help democratize our comprehensive zero-trust approach by removing the barriers between the teams responsible…
Context is Everything When it Comes to Securing Application Access
Read the original article: Context is Everything When it Comes to Securing Application Access Cisco SecureX connects access controls across the workforce, workload, and workplace to help democratize our comprehensive zero-trust approach by removing the barriers between the teams responsible…
Big Security in a Small Business World: 10 myth busters for SMB cybersecurity
Read the original article: Big Security in a Small Business World: 10 myth busters for SMB cybersecurity CISO Advisor Wolf Goerlich offers insights from Cisco’s latest security report, ‘Big Security in a Small Business World’. He also talks about how…
Threat Roundup for April 24 to May 1
Read the original article: Threat Roundup for April 24 to May 1 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 24 and May 1. As with previous roundups, this post isn’t meant to…
Zero Trust, Microsegmentation, Whitelisting, Oh My…
Read the original article: Zero Trust, Microsegmentation, Whitelisting, Oh My… Zero-trust doesn’t require complete reinvention of your infrastructure. Tetration’s “trust nothing, verify everything” approach for microsegmentation gives workloads significant protection from attack while supporting your existing security investments. The post…
Cisco Email Security and SecureX: protecting against email threats and unnecessary complexity
Read the original article: Cisco Email Security and SecureX: protecting against email threats and unnecessary complexity Explore how organizations can effectively protect themselves against security threats but also against the complexity of managing disparate security products that can make it…
Cisco Secure Cloud Architecture for AWS
Read the original article: Cisco Secure Cloud Architecture for AWS Cisco Secure Cloud Architecture for AWS defines security controls to protect workloads & applications deployed in AWS. It combines AWS security controls with Cisco Security controls to provide unmatched security.…
Security Stories 4: Building the best cybersecurity team, with Mark Weatherford
Read the original article: Security Stories 4: Building the best cybersecurity team, with Mark Weatherford Experienced CISO Mark Weatherford, former deputy under-secretary for cybersecurity at the U.S Department of Homeland Security, takes to the interview chair for Episode 4 of…
Real Users Speak: Cisco and the Elements of Robust Email Security
Read the original article: Real Users Speak: Cisco and the Elements of Robust Email Security Real users explain how to implement robust protection with Cisco Email Security’s sophisticated filtering, built-in intelligence and policy definition and enforcement capabilities. The post Real…
The World Has Changed – Security Should Transform to Stay Ahead
Read the original article: The World Has Changed – Security Should Transform to Stay Ahead Disruption creates two distinct sets of challenges for security professionals. The security team has to keep up with strategic IT demands, and do daily battle…
Upgraded Aggah malspam campaign delivers multiple RATs
Read the original article: Upgraded Aggah malspam campaign delivers multiple RATs By Asheer Malhotra Cisco Talos has observed an upgraded version of a malspam campaign known to distribute multiple remote access trojans (RATs). The infection chain utilized in the attacks…
Cisco Integrates Security to Save You Time
Read the original article: Cisco Integrates Security to Save You Time Cisco SecureX integrates security to eliminate complexity, optimize your security experience, and save you time. The post Cisco Integrates Security to Save You Time appeared first on Cisco Blogs.…
Building a security platform powered by advanced analytics
Read the original article: Building a security platform powered by advanced analytics The Cisco SecureX platform brings together the best of our broad and integrated security technologies, including security analytics. The post Building a security platform powered by advanced analytics…
Securing the remote work environment
Read the original article: Securing the remote work environment As organizations adopt remote working, how should they evaluate their security posture? And what are the top threats they may face? The post Securing the remote work environment appeared first on…
Threat Roundup for April 17 to April 24
Read the original article: Threat Roundup for April 17 to April 24 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 17 and Apr 24. As with previous roundups, this post isn’t meant to…
Threat Spotlight: MedusaLocker
Read the original article: Threat Spotlight: MedusaLocker By Edmund Brumaghin, with contributions from Amit Raut. Overview MedusaLocker is a ransomware family that has been observed being deployed since its discovery in 2019. Since its introduction to the threat landscape, there…
Security that Works Together – A better approach to securing Endpoints
Read the original article: Security that Works Together – A better approach to securing Endpoints Are you ready to unlock new value from your endpoint security investments? Go from partial awareness to complete and actionable insights powered by Cisco SecureX…
New research shows businesses are struggling to secure applications – here’s what you can do
Read the original article: New research shows businesses are struggling to secure applications – here’s what you can do New research shows businesses are struggling to secure applications. To stop this trend, you need closer, continuous and adaptive security. The…
Getting more value from your endpoint security tool #1: Querying Tips for security and IT operations
Read the original article: Getting more value from your endpoint security tool #1: Querying Tips for security and IT operations Cisco Orbital Advanced Search is a powerful capability to aid your endpoint detection and response defense. Empower your IT, Security,…
Vulnerability Spotlight: Zoom Communications User Enumeration
Read the original article: Vulnerability Spotlight: Zoom Communications User Enumeration Video conferencing and calling software has spiked in popularity as individuals across the globe are forced to stay home due to the COVID-19 pandemic. There are a plethora of players…
Keeping applications safe and secure in a time of remote work
Read the original article: Keeping applications safe and secure in a time of remote work Critical workloads are being accessed from home office environments, but are they secure? Cisco Tetration and Cisco AnyConnect pair up to provide comprehensive security for…
Threat Roundup for April 10 to April 17
Read the original article: Threat Roundup for April 10 to April 17 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 10 and Apr 17. As with previous roundups, this post isn’t meant to…
Post-quantum MACsec in Cisco switches
Read the original article: Post-quantum MACsec in Cisco switches Quantum Computers could threaten encryption tunnels like IPsec, MACsec, and TLS. MACsec is an authenticated encryption protocol that, if appropriately configured, can be quantum-safe. The whitepaper shows how. The post Post-quantum…
PoetRAT Uses Covid-19 Lures To Attack Azerbajian
Read the original article: PoetRAT Uses Covid-19 Lures To Attack Azerbajian Cisco Talos has discovered a new malware campaign based on a previously unknown family we’re calling “PoetRAT.” At this time, we do not believe this attack is associated with…
Security Stories Episode 3: Protecting Democracy, and Learning How to Spot Online Manipulation Tactics with Theresa Payt …
Read the original article: Security Stories Episode 3: Protecting Democracy, and Learning How to Spot Online Manipulation Tactics with Theresa Payt … Episode 3 of our Security Stories podcast is now live, and you won’t want to miss our interview…
How to Monitor VPN Split Tunneling and Remote Endpoints with Existing Infrastructure
Read the complete article: b’How to Monitor VPN Split Tunneling and Remote Endpoints with Existing Infrastructure’ This post doesn’t have text content, please click on the link below to view the original article. Advertise on IT Security News. Read…
The Firewall: The foundation for a robust Security Platform
Does a single view, a single point of multivendor integration, or a single place to conduct workflows and track metrics exist? What if, we said yes… The post The Firewall: The foundation for a robust Security Platform appeared first on…
5 Questions to Ask Your Security Platform Vendor
Your destiny is determined by your decisions. Great decisions are made by asking the right questions. Make them count with Cisco SecureX- the industries broadest security platform that unifies visibility, enables automation, & simplifies security. The post 5 Questions to…
Threat Roundup for April 3 to April 10
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 3 and Apr 10. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve…
Promising Results for Post-Quantum Certificates in TLS 1.3
Quantum Computers could threaten the security of TLS key exchange and authentication. To assess the performance of post-quantum certificates TLS 1.3, we evaluated NIST Round 2 signature algorithms. See results. The post Promising Results for Post-Quantum Certificates in TLS 1.3…
Threats Can Be Anywhere: Modernize Your Data Center Security
Today’s data centers are rapidly evolving with applications. This boosts the value of the data center, but also introduces security challenges. To address these concerns, organizations are now approaching data center security uniquely. The post Threats Can Be Anywhere: Modernize…
Security Stories Episode 2: Democratizing Security with Wendy Nather
The second episode of Security Stories, a cybersecurity podcast from the Cisco Security team, is out now. Featuring in depth interviews with CISOs and security leaders – like Wendy Nather! The post Security Stories Episode 2: Democratizing Security with Wendy…
How to Strengthen Your Security in 2020
With so many attack vectors and devices to keep track of, how can we best strengthen security in 2020? Which of the security technologies out there will help us most? The post How to Strengthen Your Security in 2020 appeared…
Threat Roundup for March 27 to April 3
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Mar 27 and Apr 3. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve…
Top 5 features of a Network Traffic Analysis (NTA) tool- Why you need Stealthwatch now more than ever
Top 5 features of an NTA tool as stated by Enterprise Strategy Group and the Information Systems Security Association, and why CISOs need Stealthwatch now more than ever. The post Top 5 features of a Network Traffic Analysis (NTA) tool-…
AZORult brings friends to the party
By Vanja Svajcer. Attackers are constantly reinventing ways of monetizing their tools. Cisco Talos recently discovered a complex campaign with several different executable payloads, all focused on providing financial benefits for the attacker in a slightly different way. The first…
Expanding Free Security Offers into Customers’ Endpoints
As companies work to secure remote workers, Cisco extends free security offers to also include Cisco Advanced Malware Protection (AMP) for Endpoints. The post Expanding Free Security Offers into Customers’ Endpoints appeared first on Cisco Blogs. Advertise on IT…
Buyers Beware: Scamming Is Rife, Especially In a Time of Crisis
In the midst of this global health crisis, bad actors are capitalizing on people’s fears. Read how Dean De Beer, Cisco product line CTO, used Cisco security tools to quickly investigate a COVID19-themed scam. The post Buyers Beware: Scamming Is…
Trickbot: A primer
In recent years, the modular banking trojan known as Trickbot has evolved to become one of the most advanced trojans in the threat landscape. It has gone through a diverse set of changes since it was first discovered in 2016,…
Stealing passwords with credential dumping
What’s the quickest way to access a computer? Logging in. As obvious as this may sound, it’s worth reflecting on this. Because while logging in is so second nature that you probably don’t give it much consideration, it’s also one…
Zero chance of tackling zero trust without a platform approach
Zero trust has become an important paradigm for adequately securing an enterprise environment. But not all zero trust models are created equal… The post Zero chance of tackling zero trust without a platform approach appeared first on Cisco Blogs. …
COVID-19 relief package provides another platform for bad actors
The ongoing COVID-19 pandemic continues to yield new subject matter that bad actors can turn into fodder for enticing victims into clicking on malicious links and attachments. On March 27, the CARES Act was signed into law by the President,…
Threat Roundup for March 20 to March 27
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Mar 20 and Mar 27. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve…
Threat Update: COVID-19
The COVID-19 pandemic is changing everyday life for workers across the globe. Cisco Talos continues to see attackers take advantage of the coronavirus situation to lure unsuspecting users into various pitfalls such as phishing, fraud, and disinformation campaigns. Talos has…
Understanding the Shared Responsibility Model: Securing Public Cloud Just Got Easier
Securing public cloud assets and services is critical, but deciding how or what is secured can be confusing. The shared responsibility model clarifies who is responsible for securing what, strengthening your security posture. The post Understanding the Shared Responsibility Model:…