- Our Favorite Topics:
Vulnerability Spotlight: Multiple privilege escalation vulnerabilities in CleanMyMac X
1 min read
Tyler Bohan of Cisco Talos discovered several vulnerabilities in MacPaw’s CleanMyMac X software, a cleanup application for Mac operating systems that allows users to free up space on their machines.
Threat Roundup for Dec. 14 to Dec. 21
1 min read
Summary of threats observed between December 14-21. Our customers are automatically protected from these threats, but we highlight key behavioral characteristics and indicators of compromise (not in-depth analysis).
Submissions for talks at the 2019 Talos Threat Research Summit are now open
1 min read
Cisco Talos is happy to announce that the Talos Threat Research Summit is returning in 2019. This time, we are expanding the number of attendees to 500 — double what we...
Talos’ Malware Year in Review
1 min read
It was easy to see a wild year coming in cybersecurity. It started with a bang, with Olympic Destroyer targeting the Winter Olympics in February in an attempt to disrupt...
Cisco ISE – Playing Nice in the Security Ecosystem
5 min read
2005 has long come and gone, and in this day and age, segmenting traffic on your network should mean more than a separate voice and data VLAN.
Three ways to detect cryptomining activities using network security analytics
4 min read
Looking back at 2018, malicious cryptomining emerged as one of the most prominent threats. As described in-depth in this blog, cryptocurrency mining, or cryptomining for short, is the process...
The Greatest Gap in Securing Critical Infrastructure
4 min read
By practicing incident response plans you’ll decrease the time it takes to respond appropriately and recover from a real incident.
Cisco Threat Response: Open Source Integrations You Can Use Now
1 min read
Cisco Threat Response is built upon a collection of APIs; which can be used to integrate your Cisco and third-party security products, automate the incident response process and manage...
As Cryptocurrency Crash Continues, Will Mining Threat Follow?
1 min read
Post authored by Nick Biasini. Executive Summary As 2018 draws to a close, one technology has definitively left its...
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services