advanced malware

January 6, 2021

THREAT RESEARCH

A Deep Dive into Lokibot Infection Chain

1 min read

News summary Lokibot is one of the most well-known information stealers on the malware landscape. In this post, we’ll provide a technical breakdown of one of the latest Lokibot campaigns. Talos also has a new script to unpack the dropper’s third stage. The actors behind Lokibot usually have the ability to steal multiple types of […]

August 16, 2019

SECURITY

Three Reasons to Upgrade Your Legacy AV/Endpoint Security

3 min read

Most technology from the ‘80s – ‘90s (portable CD players, floppy disks, 2G flip phones) did not survive the digital evolution. One technology did survive, however... Legacy antivirus (AV).

July 1, 2019

THREAT RESEARCH

RATs and stealers rush through “Heaven’s Gate” with new loader

1 min read

Malware is constantly finding new ways to avoid detection. This doesn't mean that some will never be detected, but it does allow adversaries to increase the period of time between...

February 27, 2019

SECURITY

Cisco Security at Work: Threatwall at Mobile World Congress 2019

3 min read

The Threatwall is a live display of threats on open conference wireless networks wherever it is deployed, such as Cisco Live or WMC, providing valuable insights on network traffic trends.

October 15, 2018

THREAT RESEARCH

Old dog, new tricks – Analysing new RTF-based campaign distributing Agent Tesla, Loki with PyREbox

1 min read

This blog post was authored by Edmund Brumaghin and Holger Unterbrink with contributions from Emmanuel Tacheau. Executive Summary Cisco Talos has discovered a new malware campaign...

April 11, 2018

SECURITY

Protecting against crypto mining and malware

4 min read

It wasn’t until late 2017 that threat researchers discovered spam campaigns delivering crypto payloads using email attachments. In some cases, a Word document downloads the crypto payload via a malicious...

July 31, 2017

SECURITY

From the Trenches: 5 Ways Customers are Improving Security with Cisco AMP for Endpoints

3 min read

Does this sound like a day in your IT security life? Wake up, get coffee, drive to work, and battle an almost constant onslaught of attacks, while playing whack-a-mole with too many alerts. If so, we get it. You never know where the next attack will come from. And you’re probably on to the fact […]