- Our Favorite Topics:
Threat Spotlight: MedusaLocker
1 min read
By Edmund Brumaghin, with contributions from Amit Raut. Overview MedusaLocker is a ransomware family that has been observed being deployed since its discovery in 2019. Since its introduction to the threat landscape, there have been several variants observed. However, most of the functionality remains consistent. The most notable differences are changes to the file extension […]
Security that Works Together – A better approach to securing Endpoints
5 min read
Are you ready to unlock new value from your endpoint security investments? Go from partial awareness to complete and actionable insights powered by Cisco SecureX - the industry broadest security platform that unifies visibility, enables automation, and simplifies security.
New research shows businesses are struggling to secure applications – here’s what you can do
2 min read
New research shows businesses are struggling to secure applications. To stop this trend, you need closer, continuous and adaptive security.
Getting more value from your endpoint security tool #1: Querying Tips for security and IT operations
5 min read
Cisco Orbital Advanced Search is a powerful capability to aid your endpoint detection and response defense. Empower your IT, Security, and Network Operations teams to confidently query endpoints for valuable information.
Vulnerability Spotlight: Zoom Communications User Enumeration
1 min read
Video conferencing and calling software has spiked in popularity as individuals across the globe are forced to stay home due to the COVID-19 pandemic. There are a plethora of players in this space, with one or two getting increased attention. One service in particular — Zoom — has received an enormous amount of attention from […]
Keeping applications safe and secure in a time of remote work
2 min read
Critical workloads are being accessed from home office environments, but are they secure? Cisco Tetration and Cisco AnyConnect pair up to provide comprehensive security for workload protection.
Threat Roundup for April 10 to April 17
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 10 and Apr 17. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Post-quantum MACsec in Cisco switches
2 min read
Quantum Computers could threaten encryption tunnels like IPsec, MACsec, and TLS. MACsec is an authenticated encryption protocol that, if appropriately configured, can be quantum-safe. The whitepaper shows how.
PoetRAT Uses Covid-19 Lures To Attack Azerbajian
1 min read
Cisco Talos has discovered a new malware campaign based on a previously unknown family we’re calling “PoetRAT.” At this time, we do not believe this attack is associated with an already known threat actor. Our research shows the malware was distributed using URLs that mimic some Azerbaijan government domains, thus we believe the adversaries in […]
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services
1