- Our Favorite Topics:
Is Network Security Complexity Holding You Back?
2 min read
It’s not just your imagination. Security is getting more complex. With organizations facing challenges like managing complexity and its consequences, looking to technology integration, automation, and simplification may pave the way for IT professionals to persevere.
SWEED: Exposing years of Agent Tesla campaigns
1 min read
By Edmund Brumaghin and other Cisco Talos researchers. Executive summary Cisco Talos recently identified a large number of ongoing malware distribution campaigns linked to a threat actor we're calling "SWEED,"...
Threat Roundup for July 5 to July 12
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between July 5 and July 12. As...
Cisco Threat Response Plugin: Defeat Threats With Just a Few Clicks
3 min read
With Cisco Threat Response, customers receive a powerful solution that can streamline and simplify detection, investigation, and remediation of threats. All of this can be accessed from a very easy, powerful tool in the new browser plugin (for Chrome and Firefox).
Should governments pay extortion payments after a ransomware attack?
1 min read
When it comes to ransomware attacks this year, it’s been a tale of three cities. In May, the city of Baltimore suffered a massive ransomware attack that took many of its...
Sea Turtle Keeps on Swimming
1 min read
By Danny Adamitis with contributions from Paul Rascagneres. Executive summary After several months of activity, the actors behind the "Sea Turtle" DNS hijacking campaign are not slowing down. Cisco Talos recently discovered...
Threat Roundup for June 28 to July 5
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 28 and July 5. As...
Vulnerability Spotlight: Remote code execution vulnerabilities in Simple DirectMedia Layer
1 min read
Simple DirectMedia Layer contains two vulnerabilities that could an attacker to remotely execute code on the victim’s machine. Both bugs are present in the SDL2_image library, which is used for...
RATs and stealers rush through “Heaven’s Gate” with new loader
1 min read
Malware is constantly finding new ways to avoid detection. This doesn't mean that some will never be detected, but it does allow adversaries to increase the period of time between...
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services