Security

Prev / Page 175

January 8, 2018

SECURITY

Incident Response: Are you ready?

2 min read

We created a short eBook to help security professionals deal with“what if” scenarios by building and strengthening incident response plans, thereby identifying what to do when things go wrong.

January 5, 2018

SECURITY

Five Things You Can Do to Manage Your Privacy Now

2 min read

The Internet of Things – the increasingly connected world in which we live – is rapidly expanding. We love our convenient and fun ​devices – ​like​ ​personal assistants, wearables, speakers, cameras, TVs, cars, home alarm systems, toys and appliances. But it’s important to understand that connected devices rely on information about us – such as […]

January 5, 2018

SECURITY

Threat Round Up for December 29 – January 5

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between December 29 and January 05. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

January 4, 2018

SECURITY

Not So Crystal Clear – Zeus Variant Spoils Ukrainian Holiday

1 min read

Talos has observed a cyber attack which was launched using the official website of the Ukraine-based accounting software developer Crystal Finance Millennium (CFM).

January 3, 2018

SECURITY

Harnessing the Power of Network Meta Data: Finding Malware

2 min read

Probably not a day goes by without someone telling you about a new vulnerability or threat to your network and your data.  These threats are seemingly everywhere.  In order to protect against these threats, we use strong passwords and encryption.  Unfortunately, our adversaries are getting the same messages as they continue to scoop up our […]

January 3, 2018

SECURITY

Introducing Exploit Prevention to Stop File-Less Attacks

3 min read

In war, any good military strategist will try to exploit their enemy’s weaknesses. Cybercriminals are no different. Their latest tactic: use file-less attacks to exploit vulnerabilities in everyday applications.

December 27, 2017

SECURITY

The Impact on Network Security Through Encrypted Protocols – QUIC

3 min read

QUIC stands for Quick UDP Internet Connections, an experimental protocol designed and deployed by Google.

December 21, 2017

SECURITY

Defending Against The $5B Cybersecurity Threat – Business Email Compromise

3 min read

If an average employee at your company got an email from an executive with an urgent request, would they question whether the email was coming from the actual sender? They probably wouldn’t. The reality is that most people would act on the request because of its time-sensitive nature. They assume that the IT team has […]

December 19, 2017

SECURITY

Vulnerability Spotlight: VMWare VNC Vulnerabilities

1 min read

Today, Talos is disclosing a pair of vulnerabilities in the VNC implementation used in VMWare’s products that could result in code execution. VMWare implements VNC for its remote management, remote access, and automation purposes in VMWare products including Workstation, Player, and ESXi which share a common VMW VNC code base. The vulnerabilities manifest themselves in […]

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services