Dynamic Data Resolver – Version 1.0.1 beta
Cisco Talos is releasing a new beta version of Dynamic Data Resolver (DDR) today. This release comes with a new architecture for samples using multi-threading. The process and thread tracing has been completely reimplemented. We also fixed a few bugs and memory leaks. Another new feature is that the DDR backend now comes in two […]
Trust in Yourself and the Process: Key Guidance for Forging a Successful Cybersecurity Career
If given the chance, what advice would you give your younger self? Learn what successful practitioners say helped them to be successful in their cybersecurity career.
Threat Roundup for October 9 to October 16
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between October 9 and October 16. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Stop playing whack-a-mole and put threats to rest with Cisco Stealthwatch Cloud
Stop playing whack-a-mole with your network. Even with proper endpoint and perimeter protection, you still need a tool like Stealthwatch Cloud that is adept at tracking malware through east-west traffic.
Openness and support: Discussions on why diverse representation in cybersecurity matters
Read more about the topics in our latest Security Stories podcast, in which the team discuss where companies can find diverse talent, beyond the usual recruitment channels/ They also share their personal stories and discuss the overall significance of diversity and representation in cybersecurity. We also meet Cisco’s new CISO, Mike Hanley, to talk about the culture he inspires in his team, and what the last few months have been like for him.
Lemon Duck brings cryptocurrency miners back into the spotlight
Attackers are constantly reinventing ways of monetizing their tools. Cisco Talos recently discovered a complex campaign employing a multi-modular botnet with multiple ways to spread. This threat, known as “Lemon Duck,” has a cryptocurrency mining payload that steals computer resources to mine the Monero virtual currency. The actor employs various methods to spread across the […]
Technology as a Security Springboard: How These Experts Pivoted to Cybersecurity
There's more than one way to get your foot in the door of cybersecurity, and the stories of these people prove it. Read the blog and be inspired by their experiences.
Threat Landscape Trends: Endpoint Security, Part 2
In this blog series, Threat Landscape Trends, we’ll be taking a look at activity in the threat landscape and sharing the latest trends we see. By doing so, we hope to shed light on areas where you can quickly have an impact in defending your assets, especially if dealing with limited security resources.
Threat Roundup for October 2 to October 9
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between September 25 and October 2. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Why Cisco Security?
Explore our Products & Services
Get Security Blogs via Email
Stay up to date and get the latest blogs from Cisco Security