Threat Spotlight: Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors

This post was authored by Ben Baker and Alex Chiu. Executive Summary Threat actors and security researchers are constantly looking for ways to better detect and evade each other.  As researchers have become more adept and efficient at malware analysis, malware authors have made an effort to build more evasive samples.  Better static, dynamic, and automated analysis tools […]

#CiscoChat: The 2015 Cisco Midyear Security Report

The Cisco 2015 Midyear Security Report provides an overview of key threats observed in the first half of 2015, along with insights on current and future trends and advice for organizations that utilize security solutions and services. Coinciding with a theme, The Innovation Dogfight between Attackers and Security Vendors, this year’s report is a clear […]