- Our Favorite Topics:
Introducing SecureX
3 min read
Announcing Cisco SecureX - our open, cloud-native platform that connects Cisco's integrated security portfolio and customers' security portfolios for a simpler, more consistent experience across endpoints, cloud, network, and applications.
A 20/20 Vision for Cybersecurity
3 min read
To help you achieve your 2020 vision, our annual CISO Benchmark Report contains contextually useful information for any security leader today.
The Future of Cisco Security: Protecting What’s Now and What’s Next
3 min read
Security should be a business enabler, so organizations can embrace the digital transformation. Cisco Security has been on a journey to give customers the best protection and simple user experience with Cisco SecureX.
Threat Roundup for February 14 to February 21
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Feb 14 and Feb 21. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
ObliqueRAT: New RAT hits victims’ endpoints via malicious documents
1 min read
By Asheer Malhotra. Cisco Talos has observed a malware campaign that utilizes malicious Microsoft Office documents (maldocs) to spread a remote access trojan (RAT) we’re calling “ObliqueRAT.” These maldocs use malicious macros to deliver the second stage RAT payload. This campaign appears to target organizations in Southeast Asia. Network based detection, although important, should be […]
4 Cybersecurity Trends that Will Make an Impact in 2020
4 min read
As we approach RSA 2020, here are four cybersecurity trends that will be making an impact this year.
The Voice of the CISO Customers – CISO Day in Europe
2 min read
Key insights from CISOs during Cisco Live Europe teach us how to lead with influence, connect security to the business, address skill shortage and protect industrial IoT environments.
Building a bypass with MSBuild
1 min read
By Vanja Svajcer. In one of our previous posts, we discussed the usage of default operating system functionality and other legitimate executables to execute the so-called “living-off-the-land” approach to the post-compromise phase of an attack. We called those binaries LoLBins. Since then, Cisco Talos has analyzed telemetry we received from Cisco products and attempted to […]
Threat Roundup for February 7 to February 14
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Feb 7 and Feb 14. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services
9