- Our Favorite Topics:
The light is green! But is it safe to go? Abusing users’ faith in HTTPS
3 min read
This post was authored by Anna Shirokova and Ivan Nikolaev John Smith had a lot of friends and liked to travel. One day he got an email that read: "Money has been sent...
File2pcap – The Talos Swiss Army Knife of Snort Rule Creation
1 min read
This post was authored by Martin Zeiser with contributions by Joel Esler At Talos we are constantly on the lookout for threats to our customers networks, and part of the protection process is creating Snort rules for the latest vulnerabilities in order to detect any attacks. To improve your understanding of the rule development process, consider […]
Can Your Organisation Be Breached? Find Out with a Red Team
4 min read
Have you ever wondered about how the everyday information available on your network could compromise your entire organisation? I lead the Cisco Security Advisory Services team in EMEAR. We recently performed a “Red Team” exercise in which our client set us the objective of attempting to gain access to their client database. For the uninitiated: […]
AMPlify your Security
2 min read
See how our customers are enhancing their security posture with AMP for Endpoints At Cisco we know that security teams are a critical piece of what’s possible in any organization and simplifying their job is of utmost importance to us. We believe that by allowing customers to see more, protect better and respond faster we […]
Modified Zyklon and plugins from India
1 min read
Streams of malicious emails Talos inspects every day usually consist of active spamming campaigns for various ransomware families, phishing campaigns and the common malware family suspects such as banking Trojans and bots.. It is however often more interesting to analyze campaigns smaller in volume as they might contain more interesting malware. A few weeks ago […]
Cisco IoT Threat Defense: Securing the IoT at Scale
3 min read
Protect Vital Services in Advanced Medical Care, Automated Manufacturing, and Power Generation and Delivery From time to time, I find it’s helpful to pause and take stock of why I do what I do. Recently, I found myself talking with a CEO of a medical startup. Their goal was to improve the care of cancer […]
Cisco Coverage for Adylkuzz, Uiwix, and EternalRocks
1 min read
When the WannaCry attack was launched a little over a week ago, it was one of the first large scale attacks leveraging the data that was leaked by the Shadow Brokers. At the time the real concern was how quickly we would begin to see other threats leverage the same vulnerabilities. Over the past couple […]
The Network’s Role in Securing the IoT
3 min read
Over the past few weeks, I’ve blogged about the importance of having a holistic security strategy for the Internet of Things (IoT). Now is the time to really amp up security and privacy by design at the endpoint device level. Everyone has a role to play. We know that enterprises are struggling to secure their […]
Terror Evolved: Exploit Kit Matures
1 min read
Talos is monitoring the major Exploit Kits(EK) on an ongoing basis. While investigating the changes we recently observed in the RIG EK campaigns, we identified another well known candidate: Terror Exploit Kit. Terror EK is one of the new players who showed up after the big Exploit Kit market consolidation last year. When Angler and […]
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services
3