Security

Prev / Page 198

May 24, 2017

SECURITY

The light is green! But is it safe to go? Abusing users’ faith in HTTPS

3 min read

This post was authored by Anna Shirokova and Ivan Nikolaev John Smith had a lot of friends and liked to travel. One day he got an email that read: "Money has been sent...

May 24, 2017

SECURITY

File2pcap – The Talos Swiss Army Knife of Snort Rule Creation

1 min read

This post was authored by Martin Zeiser with contributions by Joel Esler At Talos we are constantly on the lookout for threats to our customers networks, and part of the protection process is creating Snort rules for the latest vulnerabilities in order to detect any attacks. To improve your understanding of the rule development process, consider […]

May 24, 2017

SECURITY

Can Your Organisation Be Breached? Find Out with a Red Team

4 min read

Have you ever wondered about how the everyday information available on your network could compromise your entire organisation? I lead the Cisco Security Advisory Services team in EMEAR.  We recently performed a “Red Team” exercise in which our client set us the objective of attempting to gain access to their client database. For the uninitiated: […]

May 23, 2017

SECURITY

AMPlify your Security

2 min read

See how our customers are enhancing their security posture with AMP for Endpoints At Cisco we know that security teams are a critical piece of what’s possible in any organization and simplifying their job is of utmost importance to us. We believe that by allowing customers to see more, protect better and respond faster we […]

May 23, 2017

SECURITY

Modified Zyklon and plugins from India

1 min read

Streams of malicious emails Talos inspects every day usually consist of active spamming campaigns for various ransomware families, phishing campaigns and the common malware family suspects such as banking Trojans and bots.. It is however often more interesting to analyze campaigns smaller in volume as they might contain more interesting malware. A few weeks ago […]

May 23, 2017

SECURITY

Cisco IoT Threat Defense: Securing the IoT at Scale

3 min read

Protect Vital Services in Advanced Medical Care, Automated Manufacturing, and Power Generation and Delivery From time to time, I find it’s helpful to pause and take stock of why I do what I do. Recently, I found myself talking with a CEO of a medical startup. Their goal was to improve the care of cancer […]

May 22, 2017

SECURITY

Cisco Coverage for Adylkuzz, Uiwix, and EternalRocks

1 min read

When the WannaCry attack was launched a little over a week ago, it was one of the first large scale attacks leveraging the data that was leaked by the Shadow Brokers. At the time the real concern was how quickly we would begin to see other threats leverage the same vulnerabilities. Over the past couple […]

May 18, 2017

SECURITY

The Network’s Role in Securing the IoT

3 min read

Over the past few weeks, I’ve blogged about the importance of having a holistic security strategy for the Internet of Things (IoT). Now is the time to really amp up security and privacy by design at the endpoint device level. Everyone has a role to play. We know that enterprises are struggling to secure their […]

May 18, 2017

SECURITY

Terror Evolved: Exploit Kit Matures

1 min read

Talos is monitoring the major Exploit Kits(EK) on an ongoing basis. While investigating the changes we recently observed in the RIG EK campaigns, we identified another well known candidate: Terror Exploit Kit. Terror EK is one of the new players who showed up after the big Exploit Kit market consolidation last year. When Angler and […]

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services