- Our Favorite Topics:
10 years of virtual dynamite: A high-level retrospective of ATM malware
1 min read
It has been 10 years since the discovery of Skimer, first malware specifically designed to attack automated teller machines (ATMs). At the time, the learning curve for understanding its functionality...
Office 365 phishing
5 min read
Let’s be honest: administering email is a pain. Routing issues, disk quotas, bouncebacks, the times when users can send but not receive emails, receive but not send, or they flat...
Threat Roundup for May 17 to May 24
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between May 17 and May 24. As...
One year later: The VPNFilter catastrophe that wasn’t
1 min read
One year ago, Cisco Talos first disclosed the existence of VPNFilter on May 23, 2018. The malware made headlines across the globe, as it was a sophisticated piece of malware...
Sorpresa! JasperLoader targets Italy with a new bag of tricks
1 min read
Nick Biasini and Edmund Brumaghin authored this blog post. Executive summary Over the past few months,...
GDPR One Year On: What Have We Learned?
2 min read
The paper analyzes and details the benefits of privacy and contemplates the future state of data privacy.
Cisco is a Representative Vendor in the first ever Gartner 2019 Market Guide for the NTA (Network Traffic Analysis) mark …
3 min read
According to Gartner1, “Applying behavioral analysis to network traffic is helping enterprises detect suspicious traffic that other security tools are missing.” The case for network traffic analysis to uncover...
Recent MuddyWater-associated BlackWater campaign shows signs of new anti-detection techniques
1 min read
This blog was authored by Danny Adamitis, David Maynor, and Kendall McKay Executive summary Cisco Talos assesses with moderate confidence that a campaign we recently...
Cisco AMP for Endpoints excelling in AV Comparatives Business Main Test Series
2 min read
Cisco AMP for Endpoints demonstrates an elite combination of threat detection, investigation, and response. And with low false positives, IT professionals can quickly identify and respond to threats.
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services