Gandcrab Ransomware Walks its Way onto Compromised Sites
While we've seen cryptocurrency miners overtake ransomware as the most popular malware on the threat landscape, Gandcrab is proof that ransomware can still strike at any time.
While we've seen cryptocurrency miners overtake ransomware as the most popular malware on the threat landscape, Gandcrab is proof that ransomware can still strike at any time.
Security threats and attacks come in many shapes and forms, but none have been more impactful than wiper attacks. Attackers who deploy wiper malware have a singular purpose of destroying or disrupting systems and/or data.
Today, Microsoft has released its monthly set of security advisories for vulnerabilities that have been identified and addressed in various products. This month's advisory release addresses 67 new vulnerabilities,...
Today, Talos is releasing details of a new vulnerability within MySQL Multi-Master Manager. This is used to perform monitoring, failover and management of MySQL master-master replication configurations.
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between April 27 and May 4. As with previous roundups, this post isn't meant to be an...
Many professional athletes would say that while winning the first championship is unforgettable, its winning back-to-back championships—or even accomplishing the rare three-peat—that carries special meaning as it requires an enduring...
Network security threats are a fact of life. But the modern security arsenal has highly effective tools like security information and event management. SIEM platforms can provide a wealth of...
The GSMA Mobile World Congress in Barcelona, Spain, is the largest exhibition for a mobile industry. This year, Mobile World Congress attracted more than 107,000 attendees. But high profile, public...
Everyone who works at Cisco knows that we encourage, promote and value a diverse workforce. Supporting women is an important part of that effort. The difference in tangible support from...
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Explore our Products & Services