- Our Favorite Topics:
Threat Roundup for March 27 to April 3
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Mar 27 and Apr 3. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Top 5 features of a Network Traffic Analysis (NTA) tool- Why you need Stealthwatch now more than ever
3 min read
Top 5 features of an NTA tool as stated by Enterprise Strategy Group and the Information Systems Security Association, and why CISOs need Stealthwatch now more than ever.
AZORult brings friends to the party
1 min read
Attackers are constantly reinventing ways of monetizing their tools. Cisco Talos recently discovered a complex campaign with several different executable payloads, all focused on providing financial benefits for the attacker in a slightly different way.
Expanding Free Security Offers into Customers’ Endpoints
2 min read
As companies work to secure remote workers, Cisco extends free security offers to also include Cisco Advanced Malware Protection (AMP) for Endpoints.
Buyers Beware: Scamming Is Rife, Especially In a Time of Crisis
4 min read
In the midst of this global health crisis, bad actors are capitalizing on people’s fears. Read how Dean De Beer, Cisco product line CTO, used Cisco security tools to quickly investigate a COVID19-themed scam.
Trickbot: A primer
1 min read
In recent years, the modular banking trojan known as Trickbot has evolved to become one of the most advanced trojans in the threat landscape. It has gone through a diverse set of changes since it was first discovered in 2016, including adding features that focus on Windows 10 and modules that target point of sale […]
Zero chance of tackling zero trust without a platform approach
5 min read
Zero trust has become an important paradigm for adequately securing an enterprise environment. But not all zero trust models are created equal…
Stealing passwords with credential dumping
6 min read
What is “credential dumping” and why should security professionals be paying attention? Find out more in this Threat of the Month.
COVID-19 relief package provides another platform for bad actors
1 min read
The ongoing COVID-19 pandemic continues to yield new subject matter that bad actors can turn into fodder for enticing victims into clicking on malicious links and attachments. On March 27, the CARES Act was signed into law by the President, enacting a wide range of stimulus packages designed to aid Americans and businesses during the […]
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services