- Our Favorite Topics:
Scaling Visibility and Security within the Operational Technology (OT) Environment
4 min read
Mid- to large-sized enterprises have for many years built the operational technology (OT) environment like an egg – a hard exterior protected by traditional security elements such as firewalls, IDS/IPS,...
Threat Roundup for June 22-29
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 22 and June 29. As with previous round-ups, this post isn't meant to be an...
Vulnerability Spotlight: VMWare Workstation DoS Vulnerability
1 min read
Today, Talos is disclosing a vulnerability in VMWare Workstation that could result in Denial of Service. VMWare Workstation is a widely used virtualization platform designed to run alongside a...
Demystifying: Machine Learning in Endpoint Security
6 min read
Deciding on a new endpoint security vendor is tough. From your very first search, you’ll get a lot of overused terms thrown at you – machine learning, artificial intelligence, next-generation...
Files Cannot Be Decrypted? Challenge Accepted. Talos Releases ThanatosDecryptor
1 min read
Talos is releasing ThanatosDecryptor, a free decryption tool that exploits weaknesses in the design of the file encryption methodology used by Thanatos. This utility can be used to regain access to data.
Secure Your Mobile Connections with New IP Blocking Feature
2 min read
When downloading an application from the App Store, do you actually check the logistics of it? For example, how is it connecting to the internet? Or an even more relatable...
Threat Roundup for June 16-22
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 1 and June 15. As with previous round-ups, this post isn't meant to be an...
Cisco PSIRT Notice About Public Exploitation of the Cisco ASA Web Services Denial of Service Vulnerability
1 min read
With the security of our customers' networks being a top priority, we're actively raising awareness of a vulnerability affecting Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software.
Secure your Endpoints Against Ransomware: Introducing Malicious Activity Protection
2 min read
In 2017, ransomware evolved new ways to attack your endpoints. In 2018, enter a new engine for AMP for Endpoints, Malicious Activity Protection that stops malware from encrypting a host.
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services
1