- Our Favorite Topics:
Incident response: Putting all the R’s in IR
5 min read
It is well established that the ‘R’ in IR stands for “Response.” But given the challenges facing incident response teams today, IR could just as well stand for “It’s Rough.”
“Spark Joy” With New 12.0 Email Security Features & Videos
2 min read
When you see “software update available,” does it spark joy? For many of us, the answer is a resounding “no.” But, don’t be fooled into thinking that our new 12.0...
Sodinokibi Ransomware Exploits WebLogic Server Vulnerability
1 min read
Attackers are actively exploiting a recently disclosed vulnerability in Oracle WebLogic to install a new variant of ransomware called "Sodinokibi," which attempts to encrypt user data and then deletes shadow copy backups to make data recovery more difficult.
The PSIRT Services Framework: Helping the Industry Protect the Ecosystem
3 min read
At Cisco, our leadership made the decision over twenty four years ago that we would clearly publicly communicate security vulnerabilities or other issues that could potentially expose customers to risk....
TLS Fingerprinting in the Real World
4 min read
To protect your data, you must understand the traffic on your network.
Threat Roundup for April 19 to April 26
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Apr. 19 and Apr. 26. As with previous roundups, this post isn't meant to be an...
Want to Empower Your IT Team? Give Them Better Network Security That’s Easy to Use
1 min read
With our recent acquisition of Duo, Cisco Firepower Next-Generation Firewalls work with Duo to give you the enhanced security your business requires today.
Vulnerability Spotlight: Multiple vulnerabilities in Sierra Wireless AirLink ES450
1 min read
Carl Hurd and Jared Rittle of Cisco Talos discovered these vulnerabilities. Executive summary Several exploitable vulnerabilities exist in the Sierra Wireless AirLink ES450, an LTE gateway designed for distributed enterprise,...
JasperLoader Emerges, Targets Italy with Gootkit Banking Trojan
1 min read
Nick Biasini and Edmund Brumaghin authored this blog post with contributions from Andrew Williams. Introduction to JasperLoader Malware loaders are playing an increasingly important role in malware distribution. They give...
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services