Articles
Determining the 10 most critical vulnerabilities on your network
4 min read
Learn how to take threat intelligence data available in Cisco Vulnerability Management and use it to uncover trends in Cisco Secure Firewall, uncovering new insights.
The myth of the long-tail vulnerability
6 min read
A long tail distribution of exploit attempts sounds reasonable. But is this how exploitation attempts really play out? Do attackers abandon exploits after a certain stage? To answer these questions, we’ll look at Snort data from Cisco Secure Firewall.
Explorations in the spam folder: A sum greater than the parts
6 min read
We all know to look out for phishing emails, but sometimes these scams can catch us off guard. Learn to identify minute details that, when brought together, shine light on a larger attack.
Threat Trends: Snort IPS
7 min read
In this ThreatWise TV episode we look at how Snort can be used to protect organizations, analyze Snort telemetry, and talk about what attackers often target.
Explorations in the spam folder–Holiday Edition
7 min read
We explore spam campaigns during this holiday season, demonstrating what can happen if someone actually clicks on links or open attachments in these unsolicited emails.
ThreatWise TV: Exploring Recent Incident Response Trends
5 min read
This ThreatWise TV episode, we are examining some of the revelations in the Q3 Cisco Talos Incident Response Trends Report.
Threat Trends: Vulnerabilities
7 min read
Are the most talked about vulnerabilities the same as those that are most widely used in attacks?
Threat Trends: Firewall
9 min read
Firewalls are a key component of any perimeter defense —the proverbial guard towers in your fortifications. Here, we examine the top threats encountered by Cisco Secure Firewall, and the Secure IPS component and Snort rules used control and inspect the traffic on the network.
Threat Protection: The REvil Ransomware
6 min read
We take a look under the hood of the headline-grabbing REvil ransomware, showcasing what the threat looks like and how it goes about locking down a computer.