Security

Prev / Page 195

June 23, 2017

SECURITY

Threat Round-up for June 16 – June 23

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between June 16 and June 23. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

June 23, 2017

SECURITY

A Steady Drumbeat for Simple, Open and Automated

2 min read

I continue to beat the drum for solutions that are simple, open, and automated because it’s something I’m passionate about and Cisco Security is deeply committed to. It’s the clear path forward to security as a force multiplier – helping you to improve your security posture with your existing resources. In March, I gave a […]

June 23, 2017

SECURITY

Detecting Encrypted Malware Traffic (Without Decryption)

7 min read

Identifying threats within encrypted network traffic poses a unique set of challenges, i.e. monitoring traffic for threats and malware, but how to do so while maintaining the privacy of the user.

June 22, 2017

SECURITY

Vulnerability Spotlight: Multiple Vulnerabilities in InsideSecure MatrixSSL

1 min read

These vulnerabilities were discovered by Aleksandar Nikolic of Cisco Talos Overview MatrixSSL is a TLS/SSL stack offered in the form of a Software Development Kit (SDK) that is geared towards application in Internet of Things (IOT) devices and other embedded systems. It features low resource overhead and supports many different embedded platforms. It also features […]

June 22, 2017

SECURITY

What is the Body Language of Your Encrypted Network Traffic Really Saying?

3 min read

The rise of encrypted traffic is changing the threat landscape; the increase in digital business has increased the number of services using encrypted traffic to secure information.

June 21, 2017

SECURITY

Player 1 Limps Back Into the Ring – Hello again, Locky!

1 min read

This post was authored by Alex Chiu, Warren Mercer, and Jaeson Schultz.  Sean Baird and Matthew Molyett contributed to this post. Back in May, the Necurs spam botnet jettisoned Locky ransomware in favor of the new Jaff ransomware variant. However, earlier this month Kaspersky discovered a vulnerability within Jaff which allowed them to create a decryptor. […]

June 21, 2017

SECURITY

Introducing Threat Grid for Meraki MX

1 min read

Back in July we announced the integration of Cisco Advanced Malware Protection with the Meraki MX. The AMP integration with the MX provided a simple and effective way for MX customers to detect, monitor and remediate advanced threats in their environment. We’re now taking this protection a step further with the integration of Threat Grid […]

June 21, 2017

SECURITY

Improving Cybersecurity in Healthcare: Visibility

3 min read

Imagine going to the doctor for a routine checkup. After greeting you, the physician pulls up your medical records on his tablet, but instead of your medical history, this screen pops up: Now imagine if you were waiting on the results of a biopsy, or if the ultrasound machine displayed this screen instead of your […]

June 20, 2017

SECURITY

Talos Targets Disinformation with Fake News Challenge Victory

1 min read

This post was authored by Sean Baird with contributions by Doug Sibley and Yuxi Pan   Executive Summary For the past several months, the problem of “fake news” has been abuzz in news headlines, tweets, and social media posts across the web. With historical roots in information warfare and disinformation, “fake news” is a different kind […]

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services