- Our Favorite Topics:
Embedding Trust at the Core of Critical Infrastructure
4 min read
Embedding trust and resilience into critical infrastructure is a moving target. We must focus on the trustworthiness and integrity of the technology and processes that run these critical systems.
Threat Roundup for November 13 to November 20
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between November 13 and November 20. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically […]
IT and OT Cybersecurity: United We Stand, Divided We Fall
3 min read
IT-OT collaboration is mandatory for securing industrial networks. But what’s in it for both teams? How can they build this partnership? What does converged IT/OT security operations actually mean?
ISE 3.0 Dynamic Visibility: Step into zero trust for the workplace
4 min read
Identity Service Engine (ISE) 3.0 brought us dynamic visibility — the first step to continual access and authorization based on least privilege. We can now build secure network access that keeps up with users and threats to gain zero trust within the workplace.
Back from vacation: Analyzing Emotet’s activity in 2020
1 min read
By Nick Biasini, Edmund Brumaghin, and Jaeson Schultz. Emotet is one of the most heavily distributed malware families today. Cisco Talos observes large quantities of Emotet emails being sent to individuals and organizations around the world on an almost daily basis. These emails are typically sent automatically by previously infected systems attempting to infect […]
Nibiru ransomware variant decryptor
1 min read
Nikhil Hegde developed this tool. Weak encryption The Nibiru ransomware is a .NET-based malware family. It traverses directories in the local disks, encrypts files with Rijndael-256 and gives them a .Nibiru extension. Rijndael-256 is a secure encryption algorithm. However, Nibiru uses a hard-coded string “Nibiru” to compute the 32-byte key and 16-byte IV values. The […]
Does Protection Help As Much As We Think In Security?
5 min read
How do security programs prioritize their investment, resources, and effort? In the upcoming Security Outcomes Study, we used the NIST Cybersecurity Framework to understand this. Read more on this blog.
Zero Trust for Workloads: Knowledge is Key
2 min read
Security controls must be driven down to the application workload level to be effective. Learn a comprehensive zero trust method to accomplish that.
Threat Roundup for November 6 to November 13
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between November 6 and November 13. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically […]
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services