Stealing passwords with credential dumping
What is “credential dumping” and why should security professionals be paying attention? Find out more in this Threat of the Month.
What is “credential dumping” and why should security professionals be paying attention? Find out more in this Threat of the Month.
The ongoing COVID-19 pandemic continues to yield new subject matter that bad actors can turn into fodder for enticing victims into clicking on malicious links and attachments. On March 27, the CARES Act was signed into law by the President, enacting a
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Mar 20 and Mar 27. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats
The COVID-19 pandemic is changing everyday life for workers across the globe. Cisco Talos continues to see attackers take advantage of the coronavirus situation to lure unsuspecting users into various pitfalls such as phishing, fraud, and
Securing public cloud assets and services is critical, but deciding how or what is secured can be confusing. The shared responsibility model clarifies who is responsible for securing what, strengthening your security posture.
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Mar 13 and Mar 20. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats
This award for our Keep Cisco Safe campaign represents our relentless effort to drive pervasive security, trust, data protection, and privacy into everything we do at Cisco.
With encryption becoming the new norm, it's increasingly important for organizations to gain visibility into all traffic across the enterprise. Cisco's intuitive network can help detect hidden security threats, even in encrypted traffic.
Don’t get stuck in a vicious cycle. Consider our integrated security platform — Cisco SecureX is a built-in experience within our security portfolio that connects with your entire security infrastructure, easing the burden on teams and transforming
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Explore our Products & Services