Category: Security – Cisco Blogs

SMB Cybersecurity: The Real Benefits of a Top-Down Approach

Read the original article: SMB Cybersecurity: The Real Benefits of a Top-Down Approach In a recent #CiscoChat, Hazel Burton interviews Advisory CISO Wolf Goerlich and Elevate Security co-founder Masha Sedova to discuss some SMB security myths and the importance of…

Introducing Cisco AMP for Endpoints – Premier

Read the original article: Introducing Cisco AMP for Endpoints – Premier We are excited to announce the availability AMP for Endpoints Premier package which includes our SecureX Threat Hunting feature. With AMP for Endpoints Premier, organizations can add an active,…

Under the Hood of a Security Platform

Read the original article: Under the Hood of a Security Platform June marks the general availability of Cisco SecureX. Let’s take a look under the hood as the industry learns to define what we should all expect from a security…

PROMETHIUM extends global reach with StrongPity3 APT

Read the original article: PROMETHIUM extends global reach with StrongPity3 APT The PROMETHIUM threat actor — active since 2012 — has been exposed multiple times over the past several years.. However, this has not deterred this actor from continuing and…

Threat Roundup for June 19 to June 26

Read the original article: Threat Roundup for June 19 to June 26 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between June 19 and June 26. As with previous roundups, this post isn’t meant to…

Threat Roundup for June 5 to June 12

Read the original article: Threat Roundup for June 5 to June 12 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between June 5 and June 12. As with previous roundups, this post isn’t meant to…

The impact of a diverse cybersecurity team

Read the original article: The impact of a diverse cybersecurity team In the latest episode of the Security Stories podcast, we meet the wonderful Marene Allison. She will shortly be celebrating her ten year anniversary as Vice President and CISO…

IndigoDrop spreads via military-themed lures to deliver Cobalt Strike

Read the original article: IndigoDrop spreads via military-themed lures to deliver Cobalt Strike By Asheer Malhotra. Cisco Talos has observed a malware campaign that utilizes military-themed malicious Microsoft Office documents (maldocs) to spread Cobalt Strike beacons containing full-fledged RAT capabilities.…

Addressing the Challenges of Cloud Email Infrastructures

Read the original article: Addressing the Challenges of Cloud Email Infrastructures Cloud email platforms increase productivity and reduce cost but can present their own set of challenges. Read how Cisco’s Cloud Mailbox Defense addresses those challenges head on. The post…

Cisco SecureX: Security for the Accelerated IT Agenda

Read the original article: Cisco SecureX: Security for the Accelerated IT Agenda With Cisco SecureX we wanted to transform security with a platform that would give customers the best protection and a simple user experience. This has never been more…

World, Meet Cisco Secure

Read the original article: World, Meet Cisco Secure Cisco Secure offers business and security architecture collaboration, freeing your workforce to focus valuable time and energy on objectives that really matter. Empowering you to focus more on opportunities. The post World,…

Threat Roundup for May 29 to June 5

Read the original article: Threat Roundup for May 29 to June 5 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between May 29 and June 5. As with previous roundups, this post isn’t meant to…

Umbrella with SecureX built-in: Coordinated Protection

Read the original article: Umbrella with SecureX built-in: Coordinated Protection Cisco SecureX connects the breadth of Cisco’s integrated security portfolio – including Umbrella– and your other security tools for a consistent experience that unifies visibility, enables automation, and strengthens your…

Threat Roundup for May 22 to May 29

Read the original article: Threat Roundup for May 22 to May 29 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between May 22 and May 29. As with previous roundups, this post isn’t meant to…

People Are The Strongest Link

Read the original article: People Are The Strongest Link Our special guest on the Security Stories podcast this week is Brian Honan, the founder and CEO of IRISS; Ireland’s first Computer Emergency Response Team. Our chat includes talking about managing…

Dynamic Data Resolver (DDR) — IDA Plugin 1.0 beta

Read the original article: Dynamic Data Resolver (DDR) — IDA Plugin 1.0 beta Executive summary Static reverse-engineering in IDA can often be problematic. Certain values are calculated at run time, which makes it difficult to understand what a certain basic…

Remote work and the threat landscape

Read the original article: Remote work and the threat landscape This month, we decided to take a look at some of the trends we’ve seen in a shifting threat landscape, including attackers who are adapting their techniques to take advantage of new opportunities. When you understand what they’re doing,…

Automated Threat Remediation in AWS with Stealthwatch Cloud

Read the original article: Automated Threat Remediation in AWS with Stealthwatch Cloud Stealthwatch Cloud customers often ask for remediation capabilities in the public cloud when threats are exposed. Find out how you can automatically remediate threats in AWS using Cisco…

Announcing Cisco Tetration SaaS Offering Available in Europe

Read the original article: Announcing Cisco Tetration SaaS Offering Available in Europe Tetration SaaS for workload security is now available in Europe. European enterprise, public sector or startup organizations now have a SaaS-based workload security solution, hosted in Europe. Take…

The Wolf Is Back…

Read the original article: The Wolf Is Back… Cisco Talos has discovered a new Android malware based on a leak of the DenDroid malware family. We named this malware “WolfRAT” due to strong links between this malware (and the command…

Threat Roundup for May 8 to May 15

Read the original article: Threat Roundup for May 8 to May 15 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between May 8 and May 15. As with previous roundups, this post isn’t meant to…

Tetration and AWS = Win-Win for Cloud and Workload Protection

Read the original article: Tetration and AWS = Win-Win for Cloud and Workload Protection Cloud providers like AWS offer many benefits – better capacity planning; rapid global application deployment. It’s the customer’s responsibility to secure their workloads. Inconsistent protection and…

Cisco Threat Response takes the leap with SecureX

Read the original article: Cisco Threat Response takes the leap with SecureX Are Threat Response and Cisco SecureX the same thing? Read how SecureX builds on Threat Response’s core aspects to simplify your security for greater efficiency across SecOps, NetOps,…

Firewalling and VPN in the Remote Work Era

Read the original article: Firewalling and VPN in the Remote Work Era The government is acknowledging that remote security solutions like VPN as well as cloud and workload firewalling are now more critical than ever. The post Firewalling and VPN…

Threat Roundup for May 1 to May 8

Read the original article: Threat Roundup for May 1 to May 8 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 24 and May 1. As with previous roundups, this post isn’t meant to…

Threat Roundup for April 24 to May 1

Read the original article: Threat Roundup for April 24 to May 1 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 24 and May 1. As with previous roundups, this post isn’t meant to…

Zero Trust, Microsegmentation, Whitelisting, Oh My…

Read the original article: Zero Trust, Microsegmentation, Whitelisting, Oh My… Zero-trust doesn’t require complete reinvention of your infrastructure. Tetration’s “trust nothing, verify everything” approach for microsegmentation gives workloads significant protection from attack while supporting your existing security investments. The post…

Cisco Secure Cloud Architecture for AWS

Read the original article: Cisco Secure Cloud Architecture for AWS Cisco Secure Cloud Architecture for AWS defines security controls to protect workloads & applications deployed in AWS. It combines AWS security controls with Cisco Security controls to provide unmatched security.…

Real Users Speak: Cisco and the Elements of Robust Email Security

Read the original article: Real Users Speak: Cisco and the Elements of Robust Email Security Real users explain how to implement robust protection with Cisco Email Security’s sophisticated filtering, built-in intelligence and policy definition and enforcement capabilities. The post Real…

Upgraded Aggah malspam campaign delivers multiple RATs

Read the original article: Upgraded Aggah malspam campaign delivers multiple RATs By Asheer Malhotra Cisco Talos has observed an upgraded version of a malspam campaign known to distribute multiple remote access trojans (RATs). The infection chain utilized in the attacks…

Cisco Integrates Security to Save You Time

Read the original article: Cisco Integrates Security to Save You Time Cisco SecureX integrates security to eliminate complexity, optimize your security experience, and save you time. The post Cisco Integrates Security to Save You Time appeared first on Cisco Blogs.…

Building a security platform powered by advanced analytics

Read the original article: Building a security platform powered by advanced analytics The Cisco SecureX platform brings together the best of our broad and integrated security technologies, including security analytics. The post Building a security platform powered by advanced analytics…

Securing the remote work environment

Read the original article: Securing the remote work environment As organizations adopt remote working, how should they evaluate their security posture? And what are the top threats they may face? The post Securing the remote work environment appeared first on…

Threat Roundup for April 17 to April 24

Read the original article: Threat Roundup for April 17 to April 24 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 17 and Apr 24. As with previous roundups, this post isn’t meant to…

Threat Spotlight: MedusaLocker

Read the original article: Threat Spotlight: MedusaLocker By Edmund Brumaghin, with contributions from Amit Raut. Overview MedusaLocker is a ransomware family that has been observed being deployed since its discovery in 2019. Since its introduction to the threat landscape, there…

Threat Roundup for April 10 to April 17

Read the original article: Threat Roundup for April 10 to April 17 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 10 and Apr 17. As with previous roundups, this post isn’t meant to…

Post-quantum MACsec in Cisco switches

Read the original article: Post-quantum MACsec in Cisco switches Quantum Computers could threaten encryption tunnels like IPsec, MACsec, and TLS. MACsec is an authenticated encryption protocol that, if appropriately configured, can be quantum-safe. The whitepaper shows how. The post Post-quantum…

PoetRAT Uses Covid-19 Lures To Attack Azerbajian

Read the original article: PoetRAT Uses Covid-19 Lures To Attack Azerbajian Cisco Talos has discovered a new malware campaign based on a previously unknown family we’re calling “PoetRAT.” At this time, we do not believe this attack is associated with…

5 Questions to Ask Your Security Platform Vendor

Your destiny is determined by your decisions. Great decisions are made by asking the right questions. Make them count with Cisco SecureX- the industries broadest security platform that unifies visibility, enables automation, & simplifies security. The post 5 Questions to…

Threat Roundup for April 3 to April 10

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 3 and Apr 10. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve…

Promising Results for Post-Quantum Certificates in TLS 1.3

Quantum Computers could threaten the security of TLS key exchange and authentication. To assess the performance of post-quantum certificates TLS 1.3, we evaluated NIST Round 2 signature algorithms. See results. The post Promising Results for Post-Quantum Certificates in TLS 1.3…

Threats Can Be Anywhere: Modernize Your Data Center Security‎

Today’s data centers are rapidly evolving with applications. This boosts the value of the data center, but also introduces security challenges. To address these concerns, organizations are now approaching data center security uniquely. The post Threats Can Be Anywhere: Modernize…

How to Strengthen Your Security in 2020

With so many attack vectors and devices to keep track of, how can we best strengthen security in 2020? Which of the security technologies out there will help us most? The post How to Strengthen Your Security in 2020 appeared…

Threat Roundup for March 27 to April 3

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Mar 27 and Apr 3. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve…

AZORult brings friends to the party

By Vanja Svajcer. Attackers are constantly reinventing ways of monetizing their tools. Cisco Talos recently discovered a complex campaign with several different executable payloads, all focused on providing financial benefits for the attacker in a slightly different way. The first…

Expanding Free Security Offers into Customers’ Endpoints

As companies work to secure remote workers, Cisco extends free security offers to also include Cisco Advanced Malware Protection (AMP) for Endpoints. The post Expanding Free Security Offers into Customers’ Endpoints appeared first on Cisco Blogs.   Advertise on IT…

Trickbot: A primer

In recent years, the modular banking trojan known as Trickbot has evolved to become one of the most advanced trojans in the threat landscape. It has gone through a diverse set of changes since it was first discovered in 2016,…

Stealing passwords with credential dumping

What’s the quickest way to access a computer? Logging in. As obvious as this may sound, it’s worth reflecting on this. Because while logging in is so second nature that you probably don’t give it much consideration, it’s also one…

Threat Roundup for March 20 to March 27

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Mar 20 and Mar 27. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve…

Threat Update: COVID-19

The COVID-19 pandemic is changing everyday life for workers across the globe. Cisco Talos continues to see attackers take advantage of the coronavirus situation to lure unsuspecting users into various pitfalls such as phishing, fraud, and disinformation campaigns. Talos has…