- Our Favorite Topics:
Cybercrime and Fraud Part 1: Modern Tales of Piracy and Plunder
5 min read
Calico Jack, Captain Blood, and Blackbeard. So many recognizable stories, books, and movies have been made about the period of stealing and looting exemplified by the golden age of piracy....
Threat Roundup for April 26 to May 3
1 min read
Talos lists ten of the most prevalent threats observed between April 26 and May 03, summarizing key behavioral characteristics, and discussing how our customers are automatically protected from these threats.
The State of Machine Learning in 2019
7 min read
Here we are, almost four whole months into 2019 and machine learning and artificial intelligence are still hot topics in the security world. Or at least that was the impression...
Qakbot levels up with new obfuscation techniques
1 min read
Qakbot, also known as Qbot, is a well-documented banking trojan that has been around since 2008. Recent Qakbot campaigns, however, are utilizing an updated persistence mechanism that can make it...
Incident response: Putting all the R’s in IR
5 min read
It is well established that the ‘R’ in IR stands for “Response.” But given the challenges facing incident response teams today, IR could just as well stand for “It’s Rough.”
“Spark Joy” With New 12.0 Email Security Features & Videos
2 min read
When you see “software update available,” does it spark joy? For many of us, the answer is a resounding “no.” But, don’t be fooled into thinking that our new 12.0...
Sodinokibi Ransomware Exploits WebLogic Server Vulnerability
1 min read
Attackers are actively exploiting a recently disclosed vulnerability in Oracle WebLogic to install a new variant of ransomware called "Sodinokibi," which attempts to encrypt user data and then deletes shadow copy backups to make data recovery more difficult.
The PSIRT Services Framework: Helping the Industry Protect the Ecosystem
3 min read
At Cisco, our leadership made the decision over twenty four years ago that we would clearly publicly communicate security vulnerabilities or other issues that could potentially expose customers to risk....
TLS Fingerprinting in the Real World
4 min read
To protect your data, you must understand the traffic on your network.
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services
3