Avatar

Ben Nahorney

Threat Intelligence Analyst

Cisco Security

Ben Nahorney is a Threat Intelligence Analyst focused on covering the threat landscape for Cisco Security. With more than a decade and a half of experience in the Internet security field, Ben has weathered threat outbreaks reaching back to the early 2000s and helped develop and report on breaking research such as the Stuxnet virus.

A firm believer in “the right tool for the job,” Ben has been an avid producer of written, graphical, video, and data-driven content to help convey how threats operate, and authored papers on security topics ranging from email threats to detecting IoCs to annual reports on the state of the threat landscape.

Articles

October 26, 2022

SECURITY

ThreatWise TV: Exploring Recent Incident Response Trends

This ThreatWise TV episode, we are examining some of the revelations in the Q3 Cisco Talos Incident Response Trends Report.

September 27, 2022

SECURITY

Threat Trends: Vulnerabilities

Are the most talked about vulnerabilities the same as those that are most widely used in attacks?

October 19, 2021

SECURITY

Threat Trends: Firewall

Firewalls are a key component of any perimeter defense —the proverbial guard towers in your fortifications. Here, we examine the top threats encountered by Cisco Secure Firewall, and the Secure IPS component and Snort rules used control and inspect the traffic on the network.

August 11, 2021

SECURITY

Threat Protection: The REvil Ransomware

We take a look under the hood of the headline-grabbing REvil ransomware, showcasing what the threat looks like and how it goes about locking down a computer.

March 23, 2021

SECURITY

Threat Trends: DNS Security, Part 2

A deep dive into industry-specific threat trends surrounding malicious DNS activity.

March 11, 2021

SECURITY

Threat Trends: DNS Security, Part 1

An examination of the trends seen in malicious DNS activity during 2020, covering threat categories such as illicit cryptomining, phishing, trojans, ransomware, and others.

November 9, 2020

SECURITY

RDP and the remote desktop

Does your organization use RDP? In our latest Threat of the Month blog, we examine how bad actors leverage the protocol and what can be done to protect against attacks.

October 12, 2020

SECURITY

Threat Trends: Endpoint Security, Part 2

In this blog series, Threat Landscape Trends, we’ll be taking a look at activity in the threat landscape and sharing the latest trends we see. By doing so, we hope to shed light on areas where you can quickly have an impact in defending your assets, especially if dealing with limited security resources.