Security

Prev / Page 183

October 17, 2017

SECURITY

Tackling the Threat Landscape with Innovative Partnerships

3 min read

As countries digitize to expand economic growth, promote a secure environment for investment, job creation and global competitiveness, cyber attackers are also seeing the monetary and political opportunity to exploit digital expansion and its data to their advantage. The dynamic threat landscape is not a challenge to be solved by one organization, one product, or […]

October 16, 2017

SECURITY

Perspective About the Recent WPA Vulnerabilities (KRACK Attacks)

9 min read

On October 16th,Mathy Vanhoef and Frank Piessens, from the University of Leuven, published a paper disclosing a series of vulnerabilities that affect the Wi-Fi Protected Access (WPA) and the...

October 13, 2017

SECURITY

Threat Round Up for Oct 6 – Oct 13

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between October 6 and October 13. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

October 13, 2017

SECURITY

Cybersecurity is Everyone’s Responsibility: 5 ways to turbo charge your security practices

2 min read

This post was authored by Scott Garrett, GSSO, Cisco and Matt Gyde, Group Executive Security, Dimension Data. The speed at which we operate in a mobile world can result in...

October 12, 2017

SECURITY

Taking the Necessary Cybersecurity Steps Forward with Federal Government Programs

2 min read

As government agencies begin deploying cloud solutions and strategizing to meet cloud IT modernization mandates, a question arises – what will the future of the agency look like when they...

October 12, 2017

SECURITY

Disassembler and Runtime Analysis

1 min read

This post was authored by Paul Rascagneres. Introduction In the CCleaner 64bit stage 2 previously described in our blog, we explained that the attacker modified a legitimate executable that is part of “Symantec Endpoint”. This file is named EFACli64.dll. The modification is performed in the runtime code included by the compiler, more precisely in the […]

October 11, 2017

SECURITY

Spoofed SEC Emails Distribute Evolved DNSMessenger

1 min read

This post was authored by Edmund Brumaghin, Colin Grady, with contributions from Dave Maynor and @Simpo13. Executive Summary Cisco Talos previously published research into a targeted attack that leveraged an interesting infection process using DNS TXT records to create a bidirectional command and control (C2) channel. Using this channel, the attackers were able to directly […]

October 11, 2017

SECURITY

Security in Your DNA: Tips for Securing Your Network

3 min read

Cisco Stealthwatch and Identity Services Engine (ISE) are key components required to transform your network into a sensor capable of enforcing your security policies. But how do you incorporate automation...

October 11, 2017

SECURITY

How is a Stateful Firewall like a Vintage Porsche?

4 min read

“Dad, I love your vintage Porsche! But is it safe?” This is the conversation my 90-year old neighbor recently had with his adult children. The Porsche he inherited from his late father-in-law is a thing of beauty –  sleek, classic body, and driven once or twice a week. The low-mileage 911 has been maintained meticulously […]

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services