- Our Favorite Topics:
DNS Hijacking Abuses Trust In Core Internet Service
1 min read
This blog post discusses the technical details of a state-sponsored attack manipulating DNS systems. While this incident is limited to targeting primarily national security organizations in the Middle East and...
To the Depth of TLS Invisibility and Beyond
3 min read
Encrypted traffic is changing the threat landscape...Encryption technology enables greater privacy and security to communicate and transact business online. Mobile, cloud, and web applications rely on well-implemented encryption mechanisms, using keys and certificates, to ensure confidentiality and trust.
Cryptographic Visibility: Quality Encryption at Your Fingertips
3 min read
There is only one thing more important than the right answer, and that is asking the right question. I have spent my entire career doing security analytics and all of...
Kill Complexity with Cisco Defense Orchestrator
2 min read
Managing security policies is complex and time-consuming, especially when your network has multiple firewalls deployed across many locations. Cisco Defense Orchestrator is here to make your job easier.
New HawkEye Reborn Variant Emerges Following Ownership Change
1 min read
HawkEye is another example of malware being marketed across various hacking forums. Talos observed ongoing malware distribution campaigns attempting to leverage the latest version of the HawkEye keylogger/stealer, HawkEye Reborn v9, against organizations to steal sensitive information and account credentials for use in additional attacks and account compromise.
Vulnerability Spotlight: Multiple vulnerabilities in Shimo VPN’s helper tool
1 min read
Cisco Talos is disclosing a series of vulnerabilities found in the Shimo VPN Helper Tool. Shimo VPN is a popular VPN client for MacOS that can be used to connect...
Black Hat Asia 2019: Watch Out for the Secondary Payload
5 min read
Cisco Security was a proud technology partner in the Network Operations Center (NOC) at Black Hat Asia, providing secure and open Internet access to attendees. See what the NOC discovered.
Threat Roundup for April 5 to April 12
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Apr. 5 and Apr. 12. As with previous roundups, this post isn't meant to be an...
Sextortion Profits Decline Despite Higher Volume, New Techniques
1 min read
Sextortionists are doing everything to evade spam filters and convince potential victims that perceived threats are real. Here are some recent changes we’ve seen in the sextortion email landscape.
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services