Security
- Threat Research
Dridex Is Back, then it’s gone again
This post was authored by Armin Pelkmann and Earl Carter. Talos Security Intelligence and Research Group noticed a reappearance of several Dridex
Read More
- Threat Research
Microsoft Patch Tuesday for December 2014: Light Month, Some Changes
This post was authored by Yves Younan. Today, Microsoft is releasing their final Update Tuesday of 2014. Last year, the
Read More
- Security
Understanding and Addressing the Challenges of Managing Information Security – A More Responsive Approach
Just like bad weather conditions found in nature, such as typhoons, hurricanes, or snowstorms, technology system defects and vulnerabilities are
Read More
- Security
Exciting Fourth Edition of SecCon-X Bangalore
The week of November 10 was filled with learning and excitement for security technology enthusiasts at Cisco’s Bangalore campus as
Read More
- Security
Step-by-Step Setup of ELK for NetFlow Analytics
Contents Intro Java Elasticsearch Logstash Kibana Intro The ELK stack is a set of analytics tools. Its
Read More
- Threat Research
MS14-063 A Potential XP Exploit
This post was written by Marcin Noga with contributions by Earl Carter and Martin Lee. New vulnerabilities for old operating
Read More
- Threat Research
Cisco Coverage for ‘Regin’ Campaign
This post was authored by Alex Chiu with contributions from Joel Esler. Advanced persistent threats are a problem that many
Read More
- Security
Endpoint Protection and Least Prevalence
Let’s face it, malware is everywhere now, and it’s here to stay. The statistics are staggering. According to the 2014
Read More
- Threat Research
Reversing Multilayer .NET Malware
This post was authored by Dave McDaniel with contributions from Jaeson Schultz Recently, we came across a malware sample that
Read More
- Security
OpenSOC: An Open Commitment to Security
According to the Breach Level Index, between July and September of this year, an average of 23 data records were
Read More