- Our Favorite Topics:
Tackling the Threat Landscape with Innovative Partnerships
3 min read
As countries digitize to expand economic growth, promote a secure environment for investment, job creation and global competitiveness, cyber attackers are also seeing the monetary and political opportunity to exploit digital expansion and its data to their advantage. The dynamic threat landscape is not a challenge to be solved by one organization, one product, or […]
Perspective About the Recent WPA Vulnerabilities (KRACK Attacks)
9 min read
On October 16th,Mathy Vanhoef and Frank Piessens, from the University of Leuven, published a paper disclosing a series of vulnerabilities that affect the Wi-Fi Protected Access (WPA) and the...
Threat Round Up for Oct 6 – Oct 13
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between October 6 and October 13. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]
Cybersecurity is Everyone’s Responsibility: 5 ways to turbo charge your security practices
2 min read
This post was authored by Scott Garrett, GSSO, Cisco and Matt Gyde, Group Executive Security, Dimension Data. The speed at which we operate in a mobile world can result in...
Taking the Necessary Cybersecurity Steps Forward with Federal Government Programs
2 min read
As government agencies begin deploying cloud solutions and strategizing to meet cloud IT modernization mandates, a question arises – what will the future of the agency look like when they...
Disassembler and Runtime Analysis
1 min read
This post was authored by Paul Rascagneres. Introduction In the CCleaner 64bit stage 2 previously described in our blog, we explained that the attacker modified a legitimate executable that is part of “Symantec Endpoint”. This file is named EFACli64.dll. The modification is performed in the runtime code included by the compiler, more precisely in the […]
Spoofed SEC Emails Distribute Evolved DNSMessenger
1 min read
This post was authored by Edmund Brumaghin, Colin Grady, with contributions from Dave Maynor and @Simpo13. Executive Summary Cisco Talos previously published research into a targeted attack that leveraged an interesting infection process using DNS TXT records to create a bidirectional command and control (C2) channel. Using this channel, the attackers were able to directly […]
Security in Your DNA: Tips for Securing Your Network
3 min read
Cisco Stealthwatch and Identity Services Engine (ISE) are key components required to transform your network into a sensor capable of enforcing your security policies. But how do you incorporate automation...
How is a Stateful Firewall like a Vintage Porsche?
4 min read
“Dad, I love your vintage Porsche! But is it safe?” This is the conversation my 90-year old neighbor recently had with his adult children. The Porsche he inherited from his late father-in-law is a thing of beauty – sleek, classic body, and driven once or twice a week. The low-mileage 911 has been maintained meticulously […]
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services