Threat Roundup for November 13 to November 20
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between November 13 and November 20. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically […]
IT and OT Cybersecurity: United We Stand, Divided We Fall
IT-OT collaboration is mandatory for securing industrial networks. But what’s in it for both teams? How can they build this partnership? What does converged IT/OT security operations actually mean?
ISE 3.0 Dynamic Visibility: Step into zero trust for the workplace
Identity Service Engine (ISE) 3.0 brought us dynamic visibility — the first step to continual access and authorization based on least privilege. We can now build secure network access that keeps up with users and threats to gain zero trust within the workplace.
Back from vacation: Analyzing Emotet’s activity in 2020
By Nick Biasini, Edmund Brumaghin, and Jaeson Schultz. Emotet is one of the most heavily distributed malware families today. Cisco Talos observes large quantities of Emotet emails being sent to individuals and organizations around the world on an almost daily basis. These emails are typically sent automatically by previously infected systems attempting to infect […]
Nibiru ransomware variant decryptor
Nikhil Hegde developed this tool. Weak encryption The Nibiru ransomware is a .NET-based malware family. It traverses directories in the local disks, encrypts files with Rijndael-256 and gives them a .Nibiru extension. Rijndael-256 is a secure encryption algorithm. However, Nibiru uses a hard-coded string “Nibiru” to compute the 32-byte key and 16-byte IV values. The […]
Does Protection Help As Much As We Think In Security?
How do security programs prioritize their investment, resources, and effort? In the upcoming Security Outcomes Study, we used the NIST Cybersecurity Framework to understand this. Read more on this blog.
Zero Trust for Workloads: Knowledge is Key
Security controls must be driven down to the application workload level to be effective. Learn a comprehensive zero trust method to accomplish that.
Threat Roundup for November 6 to November 13
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between November 6 and November 13. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically […]
Why Cisco Security?
Explore our Products & Services
Get Security Blogs via Email
Stay up to date and get the latest blogs from Cisco Security