Disk Image Deception
Cisco's Computer Security Incident Response Team (CSIRT) detected a large and ongoing malspam campaign leveraging the .IMG file extension to bypass automated malware analysis tools and infect machines with a variety of Remote Access Trojans. During our investigation, we observed multiple tactics, techniques, and procedures (TTPs) that defenders can monitor for in their environments. Our incident response and security monitoring team's analysis on a suspicious phishing attack uncovered some helpful improvements in our detection capabilities and timing.
E-rate Funding Year 2020 Opens: 3 Key Things to Know
Guest Author: Dan Leister, E-rate Manager Cisco U.S. Public Sector On December 20th of last year, USAC announced the annual Form 471 filing window dates for E-rate Funding Year 2020 applications. This window opened January 15, 2020 and will close March 25, 2020, running for 70 days. But as you prepare your application, there […]
Non-profit spotlight: How TalkingPoints breaks barriers between teachers and parents
TalkingPoints has been a Cisco Foundation grantee since 2011, thanks to their success using technology to improve student learning outcomes. To learn more about them read on.
You are Your First Career
Amber shares how she inspired the future of women in tech during Girls Power Tech.
The End of an Era: Cisco Catalyst 6500 and its impact
How did the Catalyst 6500 change networking? Prashanth Shenoy shares his perspective about the history of the Catalyst 6500, and about the future of the Catalyst 9000 family with Wi-Fi 6 and 5G.
Meetings and Room Devices: The Best Collaborations Happen on Webex … Especially in the New Decade
Welcome to collaboration in the next decade. Learn how the best collaborations happen on Webex meetings + Webex Room devices.
How AppDynamics helps improve IT applications
Choosing which application enhancements will best serve the most users can be a difficult decision for any development team, and it certainly is for mine. It can also be difficult for teams to identify the right sources of issues in application performance. Now, many of those decisions are easier for my team because of the […]
Taking a Multi-Discipline Approach to Cyber Security
Ever wonder what the similarities are between preparing for and completing a triathlon and the world of cybersecurity in the year 2020? Well wonder no longer.