Avatar

Ben Nahorney

Threat Intelligence Analyst

Cisco Security

Ben Nahorney is a Threat Intelligence Analyst focused on covering the threat landscape for Cisco Security. With more than a decade and a half of experience in the Internet security field, Ben has weathered threat outbreaks reaching back to the early 2000s and helped develop and report on breaking research such as the Stuxnet virus.

A firm believer in “the right tool for the job,” Ben has been an avid producer of written, graphical, video, and data-driven content to help convey how threats operate, and authored papers on security topics ranging from email threats to detecting IoCs to annual reports on the state of the threat landscape.

Articles

November 9, 2020

SECURITY

RDP and the remote desktop

Does your organization use RDP? In our latest Threat of the Month blog, we examine how bad actors leverage the protocol and what can be done to protect against attacks.

October 12, 2020

SECURITY

Threat Landscape Trends: Endpoint Security, Part 2

In this blog series, Threat Landscape Trends, we’ll be taking a look at activity in the threat landscape and sharing the latest trends we see. By doing so, we hope to shed light on areas where you can quickly have an impact in defending your assets, especially if dealing with limited security resources.

September 21, 2020

SECURITY

Threat Landscape Trends: Endpoint Security, Part 1

In our new blog series, Threat Landscape Trends, we’ll be taking a look at activity in the threat landscape and sharing the latest trends we see. By doing so, we hope to shed light on areas where you can quickly have an impact defending your assets, especially if dealing with limited security resources.

September 3, 2020

SECURITY

Threat protection: The WastedLocker ransomware

What is WastedLocker and how do Cisco Security technologies stop it? In this blog, we walk through the infection process, alongside points where our technologies can detect and block the threat.

May 28, 2020

SECURITY

Remote work and the threat landscape

This month, we decided to take a look at some of the trends we’ve seen in a shifting threat landscape, including attackers who are adapting their techniques to take advantage of new opportunities. When you understand what they’re doing, it’s easier to mount a better defense against new trends in the threat landscape. 

April 27, 2020

SECURITY

Securing the remote work environment

As organizations adopt remote working, how should they evaluate their security posture? And what are the top threats they may face?

March 31, 2020

SECURITY

Stealing passwords with credential dumping

What is “credential dumping” and why should security professionals be paying attention? Find out more in this Threat of the Month.

February 25, 2020

SECURITY

Explorations in the spam folder

Everyone has a spam folder. It’s often disregarded as a dark, bottomless pit for fake emails from FedEx, pharmacy offers, and introductory emails from women far too amorous to be anything but fantastical. You’d be right to largely ignore this folder. Yet each day new emails end up in it. Most of us have learned […]

January 29, 2020

SECURITY

Securing Industrial IoT

It’s hard to ignore the ubiquity of the internet of things (IoT). Even if you’re one of those holdouts that doesn’t own consumer IoT devices such as a smart speaker, internet-connected thermostat, or a smart watch, industrial IoT (IIoT) devices—a subset of the IoT landscape—are already playing a part in your daily life. From the […]