Threat Roundup for November 27 to December 4
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between November 27 and December 4. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically […]
Secure Network Analytics (Stealthwatch) Then, Now and Beyond – Part 2: Behavioral Analytics Has its Day
Part 2 of a look back at the history and origins of Secure Network Analytics, where we look at how behavioral analytics helped shape the product into what it is today.
Xanthe – Docker aware miner
By Vanja Svajcer and Adam Pridgen, Cisco Incident Command Attackers are constantly reinventing ways of monetizing their tools. Cisco Talos recently discovered an interesting campaign affecting Linux systems employing a multi-modular botnet with several ways to spread and a payload focused on providing financial benefits for the attacker by mining Monero online currency. The actor […]
Introducing the New “Cisco Security Outcomes Study”
Our latest Cisco 2021 Security Outcomes Study analyzes 25 security practices to determine which are most impactful for strengthening organizational defenses. Find out how you can up-level your security program in the new year.
Embedding Trust at the Core of Critical Infrastructure
Embedding trust and resilience into critical infrastructure is a moving target. We must focus on the trustworthiness and integrity of the technology and processes that run these critical systems.
Threat Roundup for November 13 to November 20
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between November 13 and November 20. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically […]
IT and OT Cybersecurity: United We Stand, Divided We Fall
IT-OT collaboration is mandatory for securing industrial networks. But what’s in it for both teams? How can they build this partnership? What does converged IT/OT security operations actually mean?
ISE 3.0 Dynamic Visibility: Step into zero trust for the workplace
Identity Service Engine (ISE) 3.0 brought us dynamic visibility — the first step to continual access and authorization based on least privilege. We can now build secure network access that keeps up with users and threats to gain zero trust within the workplace.
Back from vacation: Analyzing Emotet’s activity in 2020
By Nick Biasini, Edmund Brumaghin, and Jaeson Schultz. Emotet is one of the most heavily distributed malware families today. Cisco Talos observes large quantities of Emotet emails being sent to individuals and organizations around the world on an almost daily basis. These emails are typically sent automatically by previously infected systems attempting to infect […]
Why Cisco Security?
Explore our Products & Services
Get Security Blogs via Email
Stay up to date and get the latest blogs from Cisco Security