Emotet is back after a summer break
Emotet is still evolving, five years after its debut as a banking trojan. It is one of the world's most dangerous botnets and malware droppers-for-hire.
Emotet is still evolving, five years after its debut as a banking trojan. It is one of the world's most dangerous botnets and malware droppers-for-hire.
A new threat actor named “Panda” has generated thousands of dollars worth of the Monero cryptocurrency through the use of remote access tools (RATs) and illicit cryptocurrency-mining malware.
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Sep. 6. to Sep 13. As with previous roundups, this post isn't meant to be an in-depth analysis.
Cisco’s Threat Grid App integrates with IBM’s QRadar SIEM, enabling analysts to quickly identify, understand and respond to system threats rapidly through the QRadar dashboard.
Cisco Incident Response (CSIRS) recently responded to an incident involving the Watchbog cryptomining botnet. By Luke DuCharme and Paul Lee.
Cybersecurity – the final frontier, these are the trials and tribulations that network admins face on an ongoing basis. Network admins are like Starfleet captains navigating unknown galaxies as the infrastructure of organizations become more complex.
Threat hunting, i.e. looking for threats that somehow got past your defenses, is featured in our Cisco Cybersecurity Series, "Hunting for Hidden Threats: Incorporating Threat Hunting Into Your Security Program."
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 30 and Sep. 6.
Executive Summary Cisco Talos is releasing two new tools for IDA Pro: GhIDA and Ghidraaas. GhIDA is an IDA Pro plugin that integrates the Ghidra decompiler...
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Explore our Products & Services