- Our Favorite Topics:
ObliqueRAT: New RAT hits victims’ endpoints via malicious documents
1 min read
By Asheer Malhotra. Cisco Talos has observed a malware campaign that utilizes malicious Microsoft Office documents (maldocs) to spread a remote access trojan (RAT) we’re calling “ObliqueRAT.” These maldocs use malicious macros to deliver the second stage RAT payload. This campaign appears to target organizations in Southeast Asia. Network based detection, although important, should be […]
4 Cybersecurity Trends that Will Make an Impact in 2020
4 min read
As we approach RSA 2020, here are four cybersecurity trends that will be making an impact this year.
The Voice of the CISO Customers – CISO Day in Europe
2 min read
Key insights from CISOs during Cisco Live Europe teach us how to lead with influence, connect security to the business, address skill shortage and protect industrial IoT environments.
Building a bypass with MSBuild
1 min read
By Vanja Svajcer. In one of our previous posts, we discussed the usage of default operating system functionality and other legitimate executables to execute the so-called “living-off-the-land” approach to the post-compromise phase of an attack. We called those binaries LoLBins. Since then, Cisco Talos has analyzed telemetry we received from Cisco products and attempted to […]
Threat Roundup for February 7 to February 14
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Feb 7 and Feb 14. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Threat actors attempt to capitalize on coronavirus outbreak
1 min read
By Nick Biasini and Edmund Brumaghin. Coronavirus is dominating the news and threat actors are taking advantage. Cisco Talos has found multiple malware families being distributed with Coronavirus lures and themes. This includes emotet and several RAT variants. Executive Summary Using the news to try and increase clicks and drive traffic is nothing new for […]
Cisco and Telenor: Working Together to Protect Infrastructure
2 min read
For service providers around the world, security is a fundamental and integral part of what they do. Cisco, is on a multi-year journey with Telenor because when Telenor deploys new infrastructures, security must be built into everything they do. One of the first major milestones is the roll-out of Cisco Stealthwatch in all of Telenor´s business units across their telecommunications and IT operations.
Loda RAT Grows Up
1 min read
By Chris Neal. Over the past several months, Cisco Talos has observed a malware campaign that utilizes websites hosting a new version of Loda, a remote access trojan (RAT) written in AutoIT. These websites also host malicious documents that begin a multi-stage infection chain which ultimately serves a malicious MSI file. The second stage document […]
Do I really need additional email security when using Office 365?
9 min read
Do I really need additional email security when using Office 365? One of the most common questions we get asked today, and the answer is that it depends. This blog will introduce how a customer should approach this decision, explain why it is so important to not make a tick box comparison and cover some of the areas that need to be considered.
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services