Articles
Threat Trends: Firewall
9 min read
Firewalls are a key component of any perimeter defense —the proverbial guard towers in your fortifications. Here, we examine the top threats encountered by Cisco Secure Firewall, and the Secure IPS component and Snort rules used control and inspect the traffic on the network.
Threat Protection: The REvil Ransomware
6 min read
We take a look under the hood of the headline-grabbing REvil ransomware, showcasing what the threat looks like and how it goes about locking down a computer.
Threat Explainer: Supply Chain Attacks
6 min read
In a supply chain attack, bad actors target companies you rely upon to get to your organization. This Threat Explainer blog discusses how to defend against them.
Threat Trends: DNS Security, Part 2
6 min read
A deep dive into industry-specific threat trends surrounding malicious DNS activity.
Threat Trends: DNS Security, Part 1
8 min read
An examination of the trends seen in malicious DNS activity during 2020, covering threat categories such as illicit cryptomining, phishing, trojans, ransomware, and others.
RDP and the remote desktop
6 min read
Does your organization use RDP? In our latest Threat of the Month blog, we examine how bad actors leverage the protocol and what can be done to protect against attacks.
Threat Trends: Endpoint Security, Part 2
9 min read
In this blog series, Threat Landscape Trends, we’ll be taking a look at activity in the threat landscape and sharing the latest trends we see. By doing so, we hope to shed light on areas where you can quickly have an impact in defending your assets, especially if dealing with limited security resources.
Threat Trends: Endpoint Security, Part 1
7 min read
In our new blog series, Threat Landscape Trends, we’ll be taking a look at activity in the threat landscape and sharing the latest trends we see. By doing so, we hope to shed light on areas where you can quickly have an impact defending your assets, especially if dealing with limited security resources.
Threat protection: The WastedLocker ransomware
6 min read
What is WastedLocker and how do Cisco Security technologies stop it? In this blog, we walk through the infection process, alongside points where our technologies can detect and block the threat.
Remote work and the threat landscape
4 min read
This month, we decided to take a look at some of the trends we’ve seen in a shifting threat landscape, including attackers who are adapting their techniques to take advantage of new opportunities. When you understand what they’re doing, it’s easier to mount a better defense against new trends in the threat landscape.
Securing the remote work environment
6 min read
As organizations adopt remote working, how should they evaluate their security posture? And what are the top threats they may face?
Stealing passwords with credential dumping
6 min read
What is “credential dumping” and why should security professionals be paying attention? Find out more in this Threat of the Month.
Explorations in the spam folder
7 min read
Everyone has a spam folder. It’s often disregarded as a dark, bottomless pit for fake emails from FedEx, pharmacy offers, and introductory emails from women far too amorous to be anything but fantastical. You’d be right to largely ignore this folder. Yet each day new emails end up in it. Most of us have learned […]
Securing Industrial IoT
6 min read
It’s hard to ignore the ubiquity of the internet of things (IoT). Even if you’re one of those holdouts that doesn’t own consumer IoT devices such as a smart speaker, internet-connected thermostat, or a smart watch, industrial IoT (IIoT) devices—a subset of the IoT landscape—are already playing a part in your daily life. From the […]
Malvertising
6 min read
Online advertising is an integral part of today’s internet experience. In many ways, ads are the lifeblood behind many websites, providing the necessary funding to keep sites running, as well as supporting the creation of new content. While it may appear as though the ads that are displayed are just a component of the site […]
Remote Access Trojans
6 min read
You’re working for a high-profile technology company, close to releasing a market-changing product to the public. It’s a highly contested space, with many competitors, both domestic and international. There’s also...
Threats in encrypted traffic
5 min read
There was a time when the web was open. Quite literally—communications taking place on the early web were not masked in any significant fashion. This meant that it was...
The Value of Threat Hunting
4 min read
Threat hunting, i.e. looking for threats that somehow got past your defenses, is featured in our Cisco Cybersecurity Series, "Hunting for Hidden Threats: Incorporating Threat Hunting Into Your Security Program."