Avatar

Ben Nahorney

Threat Intelligence Analyst

Cisco Security

Ben Nahorney is a Threat Intelligence Analyst focused on covering the threat landscape for Cisco Security. With more than a decade and a half of experience in the Internet security field, Ben has weathered threat outbreaks reaching back to the early 2000s and helped develop and report on breaking research such as the Stuxnet virus.

A firm believer in “the right tool for the job,” Ben has been an avid producer of written, graphical, video, and data-driven content to help convey how threats operate, and authored papers on security topics ranging from email threats to detecting IoCs to annual reports on the state of the threat landscape.

Articles

July 25, 2019

SECURITY

DNS under attack

7 min read

Attacks against DNS is of significant concern. But what exactly is DNS? How is it being attacked? And what can be done to protect against these attacks?

May 29, 2019

SECURITY

Office 365 phishing

5 min read

Let’s be honest: administering email is a pain. Routing issues, disk quotas, bouncebacks, the times when users can send but not receive emails, receive but not send, or they flat...

April 5, 2019

SECURITY

Social media and black markets

3 min read

Cybercrime happens in hidden corners of the Internet, but also in social networks: Cisco Talos uncovered 74 criminal groups on Facebook. Fortunately, Cisco has a layered defense against cybercriminals.

March 14, 2019

SECURITY

Your money or your life: Digital extortion scams

5 min read

An insidious targeted phishing scam is growing in popularity: scammers leveraging threats against your reputation, your relationships, or even your life. Witness the transition from carrot to stick.

February 14, 2019

SECURITY

Today’s critical threats: A Cisco Security threat report

2 min read

Download a copy of our first 2019 Threat Report, Defending against today’s critical threats today and start prepping for the things that are likely to come.

January 14, 2019

SECURITY

SMB and the return of the worm

5 min read

Watch the threat landscape long enough, and you’ll see that some things are cyclical. Threat types and attack methods fall in and out of fashion. As the use of one...

December 11, 2018

SECURITY

Cryptomining: A sheep or a wolf?

7 min read

One of, if not the, most prominent motivators for threat actors is money. Whether it’s botnet owners renting out their services for DDoS attacks, tech support scammers cold-calling people to...