Securing public cloud assets and services is critical, but deciding how or what is secured can be confusing. The shared responsibility model clarifies who is responsible for securing what, strengthening your security posture. The post Understanding the Shared Responsibility Model:…
Category: Security – Cisco Blogs
Understanding the Shared Responsibility Model: Securing Public Cloud Just Got Easier
Securing public cloud assets and services is critical, but deciding how or what is secured can be confusing. The shared responsibility model clarifies who is responsible for securing what, strengthening your security posture. The post Understanding the Shared Responsibility Model:…
Understanding the Shared Responsibility Model: Securing Public Cloud Just Got Easier
Securing public cloud assets and services is critical, but deciding how or what is secured can be confusing. The shared responsibility model clarifies who is responsible for securing what, strengthening your security posture. The post Understanding the Shared Responsibility Model:…
Threat Roundup for March 13 to March 20
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Mar 13 and Mar 20. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve…
Cisco Wins Global Excellence for Cybersecurity Education and Awareness
This award for our Keep Cisco Safe campaign represents our relentless effort to drive pervasive security, trust, data protection, and privacy into everything we do at Cisco. The post Cisco Wins Global Excellence for Cybersecurity Education and Awareness appeared first…
SaaS-delivered Encrypted Traffic Analytics with Cisco Stealthwatch Cloud
With encryption becoming the new norm, it’s increasingly important for organizations to gain visibility into all traffic across the enterprise. Cisco’s intuitive network can help detect hidden security threats, even in encrypted traffic. The post SaaS-delivered Encrypted Traffic Analytics with…
Security’s Vicious Cycle
Don’t get stuck in a vicious cycle. Consider our integrated security platform — Cisco SecureX is a built-in experience within our security portfolio that connects with your entire security infrastructure, easing the burden on teams and transforming workflows. The post…
Launching today: Security Stories podcast
A cybersecurity podcast from the Cisco Security team. Featuring in depth interviews with CISOs and security leaders The post Launching today: Security Stories podcast appeared first on Cisco Blogs. Advertise on IT Security News. Read the complete article: Launching…
Threat Roundup for March 6 to March 13
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Mar 6 and Mar 13. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve…
Women at Cisco take on the Cyberstart Challenge – Will You?
At Cisco, we wanted to create an internal competition to encourage our Women in Cybersecurity community members to step out of their comfort zone and learn new areas of cybersecurity. Nearly one hundred Cisco women across the globe participated in…
Are You Going About the Talent Shortage Wrong? It’s Time to Stop MacGyvering
Transforms your security teams from business blockers to business enablers with Cisco SecureX – the industry broadest security platform that unifies visibility, enables automation, and simplifies security The post Are You Going About the Talent Shortage Wrong? It’s Time to…
Five ways to detect early signs of a breach using the network
Continuous network monitoring is a necessary component of effective breach defense, to be able to detect threats in real-time before they turn into a high impact incident. The post Five ways to detect early signs of a breach using the…
As the Number of Remote Workers Rises, Cisco Supports Customers with Expansion of Free Security Offerings
As the number of remote workers rises, Cisco supports with expansion of free security offerings, including Cisco Umbrella, Cisco DUO and Cisco AnyConnect Mobility Client. The post As the Number of Remote Workers Rises, Cisco Supports Customers with Expansion of…
Cisco Identity Services Engine wins…again!
For the fourth time in the last five years, Cisco Identity Services Engine (ISE) was recognized as the top solution in the Trust Awards category for Best NAC Solution at the 2020 SC Awards. SC Media cited, innovation, scalability, ease…
Threat Roundup for February 28 to March 6
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Feb 28 and Mar 6. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve…
Enforce Endpoint Compliance and Cyber Hygiene With Duo Device Trust
According to Cisco’s 2020 CISO Benchmark Report, more than half (52%) of the respondents said that mobile devices are now extremely challenging to defend. Duo aims to solve this challenge by making it easy for organizations to enforce endpoint compliance…
Starting Your Microsegmentation journey
Securing today’s applications is a challenge due to cloud environments, containers, and microservices. Microsegmentation is an important tool for better security providing visibility, control, and automation. The post Starting Your Microsegmentation journey appeared first on Cisco Blogs . Advertise…
Bisonal: 10 years of play
Bisonal is a remote access trojan (RAT) that’s part of the Tonto Team arsenal. The peculiarity of the RAT is that it’s been in use for more than 10 years — this is an uncommon and long period for malware. Over the…
Security’s Vicious Cycle
We must challenge the conventional wisdom of security: every new threat vector requires a new solution. That you must keep adding new tools, new methodologies — and more people — to protect users, devices, apps, and networks. The post Security’s…
Are you leaving your most valued assets up for grabs?
How do you secure your most valued assets—applications? Apps are the number 1 moving target for sophisticated attacks. Read more to see how micro-segmentation with Cisco Tetration can take help you automate security for your applications. The post Are you…
Threat Roundup for February 21 to February 28
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Feb 21 and Feb 28. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve…
‘Never Trust, Always Verify’: Duo joins forces with AMP for Endpoint
Build toward a zero-trust security framework with the latest integration of Duo’s and AMP for Endpoint that allows you to manage trusted endpoints and grant secure access to your organization’s applications powered by insights from your Cisco Security Platform. The…
Threat hunting doesn’t have to be difficult—Taking a proactive position with your cybersecurity
Threat hunting takes a more proactive stance to threat detection and is available for organizations of all sizes and security maturation levels. The post Threat hunting doesn’t have to be difficult—Taking a proactive position with your cybersecurity appeared first on…
A Platform Approach + Precise Analytics = Better Equation
Without analytics, security professionals would be even more overwhelmed than they are today. Cisco is helping you take back control of your environment through our new security platform, Cisco SecureX. The post A Platform Approach + Precise Analytics = Better…
New Research Paper: Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem
Detection of malware is a constant battle between the technologies designed to detect and prevent malware and the authors creating them. One common technique adversaries leverage is packing binaries. Packing an executable is similar to applying compression or encryption and…
Explorations in the spam folder
Everyone has a spam folder. It’s often disregarded as a dark, bottomless pit for fake emails from FedEx, pharmacy offers, and introductory emails from women far too amorous to be anything but fantastical. You’d be right to largely ignore this…
A 20/20 Vision for Cybersecurity
To help you achieve your 2020 vision, our annual CISO Benchmark Report contains contextually useful information for any security leader today. The post A 20/20 Vision for Cybersecurity appeared first on Cisco Blogs. Advertise on IT Security News. Read…
The Future of Cisco Security: Protecting What’s Now and What’s Next
Security should be a business enabler, so organizations can embrace the digital transformation. Cisco Security has been on a journey to give customers the best protection and simple user experience with Cisco SecureX. The post The Future of Cisco Security:…
Introducing SecureX
Announcing Cisco SecureX – our open, cloud-native platform that connects Cisco’s integrated security portfolio and customers’ security portfolios for a simpler, more consistent experience across endpoints, cloud, network, and applications. The post Introducing SecureX appeared first on Cisco Blogs. …
Threat Roundup for February 14 to February 21
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Feb 14 and Feb 21. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve…
ObliqueRAT: New RAT hits victims’ endpoints via malicious documents
By Asheer Malhotra. Cisco Talos has observed a malware campaign that utilizes malicious Microsoft Office documents (maldocs) to spread a remote access trojan (RAT) we’re calling “ObliqueRAT.” These maldocs use malicious macros to deliver the second stage RAT payload. This…
4 Cybersecurity Trends that Will Make an Impact in 2020
As we approach RSA 2020, here are four cybersecurity trends that will be making an impact this year. The post 4 Cybersecurity Trends that Will Make an Impact in 2020 appeared first on Cisco Blogs. Advertise on IT Security…
The Voice of the CISO Customers – CISO Day in Europe
Key insights from CISOs during Cisco Live Europe teach us how to lead with influence, connect security to the business, address skill shortage and protect industrial IoT environments. The post The Voice of the CISO Customers – CISO Day in…
Building a bypass with MSBuild
By Vanja Svajcer. In one of our previous posts, we discussed the usage of default operating system functionality and other legitimate executables to execute the so-called “living-off-the-land” approach to the post-compromise phase of an attack. We called those binaries LoLBins.…
Threat Roundup for February 7 to February 14
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Feb 7 and Feb 14. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve…
Threat actors attempt to capitalize on coronavirus outbreak
By Nick Biasini and Edmund Brumaghin. Coronavirus is dominating the news and threat actors are taking advantage. Cisco Talos has found multiple malware families being distributed with Coronavirus lures and themes. This includes emotet and several RAT variants. Executive Summary…
Cisco and Telenor: Working Together to Protect Infrastructure
For service providers around the world, security is a fundamental and integral part of what they do. Cisco, is on a multi-year journey with Telenor because when Telenor deploys new infrastructures, security must be built into everything they do. One…
Loda RAT Grows Up
By Chris Neal. Over the past several months, Cisco Talos has observed a malware campaign that utilizes websites hosting a new version of Loda, a remote access trojan (RAT) written in AutoIT. These websites also host malicious documents that begin…
Do I really need additional email security when using Office 365?
Do I really need additional email security when using Office 365? One of the most common questions we get asked today, and the answer is that it depends. This blog will introduce how a customer should approach this decision, explain…
Threat Roundup for January 31 to February 7
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Jan 31 and Feb 7. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve…
Threat Roundup for January 24 to January 31
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Jan 24 and Jan 31. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve…
Get in the Security Fast Lane with a Stealthwatch and Encrypted Traffic Analytics Test Drive!
Cisco Stealthwatch provides comprehensive network-wide visibility and security analytics, so you can stay ahead of attackers and expose their locations and behaviors to help you prevent a security event from becoming a full-blown breach. Today, we’re happy to announce that…
Securing Industrial IoT
It’s hard to ignore the ubiquity of the internet of things (IoT). Even if you’re one of those holdouts that doesn’t own consumer IoT devices such as a smart speaker, internet-connected thermostat, or a smart watch, industrial IoT (IIoT) devices—a…
Time for Some Straight Talk Around Network Traffic Analysis
Network Traffic Analysis (NTA) solutions have become necessary to stay ahead of threats in today’s attack landscape. Learn what makes Cisco Stealthwatch the leading NTA product. The post Time for Some Straight Talk Around Network Traffic Analysis appeared first on…
Cloudy with a Chance of Extremely High Alert Accuracy
Analytics are becoming increasingly critical for security, and when done right, can significantly improve an organization’s risk posture. Learn how Cisco Stealthwatch can bolster your defenses. The post Cloudy with a Chance of Extremely High Alert Accuracy appeared first on…
From Privacy to Trust and ROI
The latest Cisco Data Privacy Benchmark Study provides groundbreaking research and insights on keeping data safe, earning customer trust and maximizing investments in data privacy. The post From Privacy to Trust and ROI appeared first on Cisco Blogs. Advertise…
Threat Roundup for January 17 to January 24
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Jan 17 and Jan 24. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve…
Breaking down a two-year run of Vivin’s cryptominers
News Summary There is another large-scale cryptomining attack from an actor we are tracking as “Vivin” that has been active since at least November 2017. “Vivin” has consistently evolved over the past few years, despite having poor operational security and…
Breaking down a two-year run of Vivin’s cryptominers
News Summary There is another large-scale cryptomining attack from an actor we are tracking as “Vivin” that has been active since at least November 2017. “Vivin” has consistently evolved over the past few years, despite having poor operational security and…
Threat Roundup for January 10 to January 17
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Jan 10 and Jan 17. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve…
Get in the Security Fast Lane with a Stealthwatch and Encrypted Traffic Analytics Test Drive!
Cisco Stealthwatch provides comprehensive network-wide visibility and security analytics, so you can stay ahead of attackers and expose their locations and behaviors to help you prevent a security event from becoming a full-blown breach. Today, we’re happy to announce that…
JhoneRAT: Cloud based python RAT targeting Middle Eastern countries
Today, Cisco Talos is unveiling the details of a new RAT we have identified we’re calling “JhoneRAT.” This new RAT is dropped to the victims via malicious Microsoft Office documents. The dropper, along with the Python RAT, attempts to gather…
Disk Image Deception
Cisco’s Computer Security Incident Response Team (CSIRT) detected a large and ongoing malspam campaign leveraging the .IMG file extension to bypass automated malware analysis tools and infect machines with a variety of Remote Access Trojans. During our investigation, we observed…
New Snort rules protect against recently discovered Citrix vulnerability
By Edmund Brumaghin, with contributions from Dalton Schaadt. Executive Summary Recently, the details of a critical vulnerability affecting Citrix Application Delivery Controller and Citrix Gateway servers were publicly disclosed. This vulnerability is currently being tracked using CVE-2019-19781. A public patch…
Tour the RSA Conference 2020 Security Operations Center
Register now for your free tour of the RSA Conference Security Operations Center (SOC), where engineers are monitoring all traffic on the Moscone Wireless Network for security threats. The SOC is sponsored by RSA and Cisco. Sign up for a…
Threat Roundup for January 3 to January 10
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Jan 3 and Jan 10. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve…
Datacenter Security: How to Balance Business Agility with Great Protection
With rise of applications, datacenters are rapidly evolving and so are the security threats. IDC shares the approach to securing data center and how Cisco closely aligns with it. The post Datacenter Security: How to Balance Business Agility with Great…
Continued Escalation of Tensions in the Middle East
Cisco Talos works with many organizations around the world, monitoring and protecting against sophisticated threats every day. As such, we are watching the current state of events in the Middle East very closely for our customers and partners who may…
An Overview of Zero Trust Architecture, According to NIST
NIST recently released a draft publication, Zero Trust Architecture (ZTA), an overview of a new approach to network security. Get an overview of the key tenets, threats, and how to get visibility and continuous monitoring in a zero trust architecture.…