Microsoft Netlogon exploitation continues to rise
Cisco Talos is tracking a spike in exploitation attempts against the Microsoft vulnerability CVE-2020-1472, an elevation of privilege bug in Netlogon, outlined in the August Microsoft Patch Tuesday report. The vulnerability stems from a flaw in a cryptographic authentication scheme used by the Netlogon Remote Protocol which — among other things — can be used […]
MITRE ATT&CK: The Magic of User Training
How magical can user training be? You'll be surprised at what Cisco and MITRE ATT&CK make possible. Shared responsibility is what really matters.
Threat Roundup for September 18 to September 25
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between September 18 and September 25. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Why Are Applications Difficult to Secure?
You keep hearing that applications are difficult to secure - but why? Take a deep dive into the world of application development.
Automated response with Cisco Stealthwatch
Stealthwatch’s Response Manager has been moved to the web-based UI and modernized to offer new ways to share and respond to alarms with customizable rules and actions to automate remediation.
Challenging the Status Quo, and Conquering the Fear of Failure
Hear Chris Leach's journey from accountant to CISO, as well as a rewatch of the film Hackers to celebrate its 25th anniversary!
Pushing the Zero Trust Envelope – Cisco is Named a Leader in the 2020 Forrester Zero Trust Wave
Cisco has been named a leader in the 2020 Forrester Zero Trust Wave. Thank you to our partners and customers for helping us push the envelope and trusting us.
From Firewalls to Firewalling – The Future of Enterprise Security
Now that the network perimeter is anything but static, some may wonder if the firewall is still relevant for protecting today’s enterprise. The answer is yes, now more than ever.
Are you ready to place a call for simplified cybersecurity? It’s time to stop switchboarding.
Following convoluted, manual, and outdated workflows exposes your business to the risk of threats and human error. Does your team need to maintain the bridges like the human switchboard operators constantly connecting technologies, people, and processes? Find out how automating critical security workflows helps you save time and effort with smarter security.
Why Cisco Security?
Explore our Products & Services
Get Security Blogs via Email
Stay up to date and get the latest blogs from Cisco Security