Threat Spotlight: MedusaLocker
By Edmund Brumaghin, with contributions from Amit Raut. Overview MedusaLocker is a ransomware family that has been observed being deployed since its discovery in 2019. Since its introduction to the threat landscape, there have been several variants observed. However, most of the functionality remains consistent. The most notable differences are changes to the file extension […]
Security that Works Together – A better approach to securing Endpoints
Are you ready to unlock new value from your endpoint security investments? Go from partial awareness to complete and actionable insights powered by Cisco SecureX - the industry broadest security platform that unifies visibility, enables automation, and simplifies security.
New research shows businesses are struggling to secure applications – here’s what you can do
New research shows businesses are struggling to secure applications. To stop this trend, you need closer, continuous and adaptive security.
Getting more value from your endpoint security tool #1: Querying Tips for security and IT operations
Cisco Orbital Advanced Search is a powerful capability to aid your endpoint detection and response defense. Empower your IT, Security, and Network Operations teams to confidently query endpoints for valuable information.
Vulnerability Spotlight: Zoom Communications User Enumeration
Video conferencing and calling software has spiked in popularity as individuals across the globe are forced to stay home due to the COVID-19 pandemic. There are a plethora of players in this space, with one or two getting increased attention. One service in particular — Zoom — has received an enormous amount of attention from […]
Keeping applications safe and secure in a time of remote work
Critical workloads are being accessed from home office environments, but are they secure? Cisco Tetration and Cisco AnyConnect pair up to provide comprehensive security for workload protection.
Threat Roundup for April 10 to April 17
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 10 and Apr 17. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Post-quantum MACsec in Cisco switches
Quantum Computers could threaten encryption tunnels like IPsec, MACsec, and TLS. MACsec is an authenticated encryption protocol that, if appropriately configured, can be quantum-safe. The whitepaper shows how.
PoetRAT Uses Covid-19 Lures To Attack Azerbajian
Cisco Talos has discovered a new malware campaign based on a previously unknown family we’re calling “PoetRAT.” At this time, we do not believe this attack is associated with an already known threat actor. Our research shows the malware was distributed using URLs that mimic some Azerbaijan government domains, thus we believe the adversaries in […]
Why Cisco Security?
Explore our Products & Services
Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security