Threat protection: The WastedLocker ransomware
What is WastedLocker and how do Cisco Security technologies stop it? In this blog, we walk through the infection process, alongside points where our technologies can detect and block the threat.
What is WastedLocker and how do Cisco Security technologies stop it? In this blog, we walk through the infection process, alongside points where our technologies can detect and block the threat.
Over the past several months, Cisco Talos has seen attackers carrying out ongoing email-based malware distribution campaigns to distribute various malware payloads. These email campaigns feature several notable characteristics that appear designed to
Cisco Security Technical Alliance (CSTA) facilitates open multivendor product integrations across our Security products. Our largest launch to-date; today we announce new technology partners joining CSTA and over 50 new integrations. We now have grown
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between August 21 and August 27. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats
In the spring of 2020, everything changed. But in haste, as we responded to the call of remote access and mobility, did we forget policy? And are we opening the door for a perfect stormy winter for attackers? Please read our blog and learn how you
Learn more about the current status of election security in a special episode of Security Stories, including the results of four years hands on research into election security by our Talos team.
While other portfolio vendors have enterprise agreements or security platforms, what each offers pale in comparison to Cisco. Let’s highlight three huge differentiators that enable the Cisco Secure portfolio to be the simplest to buy and use
How are SMBs reacting to these new work-related challenges to ensure security and business continuity? To find out, we at Cisco asked security executives, thought leaders, and other experts to share their thoughts.
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between August 14 and August 21. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Explore our Products & Services