Online advertising is an integral part of today’s internet experience. In many ways, ads are the lifeblood behind many websites, providing the necessary funding to keep sites running, as well as supporting the creation of new content. While it may appear as though the ads that are displayed are just a component of the site […]
Remote Access Trojans
You’re working for a high-profile technology company, close to releasing a market-changing product to the public. It’s a highly contested space, with many competitors, both domestic and international. There’s also...
The Value of Threat Hunting
Threat hunting, i.e. looking for threats that somehow got past your defenses, is featured in our Cisco Cybersecurity Series, "Hunting for Hidden Threats: Incorporating Threat Hunting Into Your Security Program."
DNS under attack
Attacks against DNS is of significant concern. But what exactly is DNS? How is it being attacked? And what can be done to protect against these attacks?
Social media and black markets
Cybercrime happens in hidden corners of the Internet, but also in social networks: Cisco Talos uncovered 74 criminal groups on Facebook. Fortunately, Cisco has a layered defense against cybercriminals.
Your money or your life: Digital extortion scams
An insidious targeted phishing scam is growing in popularity: scammers leveraging threats against your reputation, your relationships, or even your life. Witness the transition from carrot to stick.
Today’s critical threats: A Cisco Security threat report
Download a copy of our first 2019 Threat Report, Defending against today’s critical threats today and start prepping for the things that are likely to come.