- Our Favorite Topics:
PROMETHIUM extends global reach with StrongPity3 APT
1 min read
The PROMETHIUM threat actor — active since 2012 — has been exposed multiple times over the past several years.. However, this has not deterred this actor from continuing and expanding their activities. By matching indicators such as code similarity, command and control (C2) paths, toolkit structure and malicious behavior, Cisco Talos identified around 30 new […]
Post-Quantum TLS 1.3 and SSH Performance (preliminary results)
1 min read
So far, the industry has been testing post-quantum key exchange and authentication separately in a quest for a quantum-secure future. We recently have been experimenting with TLS and SSH using both post-quantum key exchange and authentication. The preliminary results are promising for some algorithms.
Ripple20: Critical Vulnerabilities Might be Putting Your IoT/OT Devices at Risk
4 min read
Ripple20 are critical vulnerabilities targeting IoT and OT assets. Learn how Cisco Cyber Vision and ISA3000 can help you detect them and protect your industrial operations.
Threat Roundup for June 19 to June 26
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between June 19 and June 26. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
When it comes to security, how many vendors is too many?
4 min read
If you’re like many other organizations today, you’re getting inundated with alerts, have too many interfaces to pay attention to, and wish to secure your environment with fewer vendors.
Why you should consider Stealthwatch to monitor your expanding network
3 min read
As networks expand, Cisco Stealthwatch has been recognized as the leading network security analytics solution due to its scalability, comprehensive visibility, and industry leading Encrypted Traffic Analytics and response capabilities.
Threat Roundup for June 5 to June 12
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between June 5 and June 12. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
The impact of a diverse cybersecurity team
2 min read
Meet Marene Allison, CISO for Johnson & Johnson, who talks about her story, from the military to Special FBI Agent to the corporate world. She also talks about the need to embrace diversity in the cybersecurity industry
IndigoDrop spreads via military-themed lures to deliver Cobalt Strike
1 min read
By Asheer Malhotra. Cisco Talos has observed a malware campaign that utilizes military-themed malicious Microsoft Office documents (maldocs) to spread Cobalt Strike beacons containing full-fledged RAT capabilities. These maldocs use malicious macros to deliver a multistage and highly modular infection. This campaign appears to target military and government organizations in South Asia. Network-based detection, although […]
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services