- Our Favorite Topics:
From Box to Backdoor: Discovering Just How Insecure an ICS Device is in Only 2 Weeks
1 min read
Inspired by "From LOW to PWNED," we decided to take a look at one Industrial Control System (ICS) wireless access point and see just how many vulnerabilities we could find in two weeks.
Threat Round-up for Mar 31 – Apr 7
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between March 31 and April 7. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]
The CISO Evolution – From IT Operations to Earning a Seat at the Table
2 min read
With the escalation of cybercrime, the role of Chief Information Security Officer (CISO) is fast evolving beyond its traditional operational functions of monitoring, repelling and responding to cyber threats. Continuous changes in our connected business landscape make customer data, intellectual property and brand properties new targets for information theft, which can directly impact business performance […]
TrapX Security Achieves Cisco Compatible Certification, Integrates DeceptionGrid with Cisco ISE pxGrid and Threat Grid
1 min read
Over the past few months, I have been working with TrapX Security, a global leader in deception-based advanced cyber-security defense to achieve the Cisco Compatible Certification.
Hacking the Belkin E Series OmniView 2-Port KVM Switch
1 min read
Author: Ian Payton, Security Advisory EMEAR Introduction Too frequently security professionals only consider software vulnerabilities when considering the risks of connecting devices to their networks and systems. When it comes to considering potential risks of connected devices and the Internet of Things, not only must security professionals consider potential vulnerabilities in the software and firmware […]
Yesterday’s Cyber Posture Just Won’t Work
2 min read
Many enterprises are still relying on yesterday’s cyber protection methods and infrastructure for their IT digitization efforts. Enterprises must also update their approach to cyber resilience in order to protect the full breadth of their operations.
Black Hat Asia 2017: SOC in the NOC
4 min read
Detecting PowerShell Exploits Black Hat returned to Asia again in 2017, with two days of technical hands-on Trainings, followed by two days of the latest research and vulnerability disclosures at the Briefings. The backbone of the conference was the WiFi network, built on site by staff from Ruckus. I was honored to be invited to […]
IoT Isn’t Just About the ‘Thing’
3 min read
Internet of Things (IoT) is the term du jour. As adoption increases the natural question becomes, how has it been secured? To understand an effective security strategy for IoT, we first need to understand where the value from IoT is generated. The ability to use data, collected from a variety of locations and sources, to […]
Introducing ROKRAT
1 min read
This blog was authored by Warren Mercer and Paul Rascagneres with contributions from Matthew Molyett. Executive Summary A few weeks ago, Talos published research on a Korean MalDoc. As we previously discussed this actor is quick to cover their tracks and very quickly cleaned up their compromised hosts. We believe the compromised infrastructure was live […]
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services