Talos’ Malware Year in Review
It was easy to see a wild year coming in cybersecurity. It started with a bang, with Olympic Destroyer targeting the Winter Olympics in February in an attempt to disrupt...
It was easy to see a wild year coming in cybersecurity. It started with a bang, with Olympic Destroyer targeting the Winter Olympics in February in an attempt to disrupt...
2005 has long come and gone, and in this day and age, segmenting traffic on your network should mean more than a separate voice and data VLAN.
Looking back at 2018, malicious cryptomining emerged as one of the most prominent threats. As described in-depth in this blog, cryptocurrency mining, or cryptomining for short, is the process...
By practicing incident response plans you’ll decrease the time it takes to respond appropriately and recover from a real incident.
Cisco Threat Response is built upon a collection of APIs; which can be used to integrate your Cisco and third-party security products, automate the incident response process and manage...
Post authored by Nick Biasini. Executive Summary As 2018 draws to a close, one technology has definitively left its...
Post authored by David Liebenberg and Andrew Williams. Executive Summary Through Cisco Talos’ investigation of illicit cryptocurrency mining...
Cisco Threat Response demystifies and proactively speeds threat hunting for the stealthiest one percent of threats that can compromise your endpoints, exfiltrate your data, and disrupt your services becomes imperative.
Black Hat Europe 2018 activity in the NOC was exciting from the first day and it never let up through the week.
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Explore our Products & Services