- Our Favorite Topics:
Security Stories 4: Building the best cybersecurity team, with Mark Weatherford
2 min read
Experienced CISO Mark Weatherford, former deputy under-secretary for cybersecurity at the U.S Department of Homeland Security, takes to the interview chair for Episode 4 of the Security Stories podcast.
Upgraded Aggah malspam campaign delivers multiple RATs
1 min read
By Asheer Malhotra Cisco Talos has observed an upgraded version of a malspam campaign known to distribute multiple remote access trojans (RATs). The infection chain utilized in the attacks is highly modularized. The attackers utilize publicly available infrastructure such as Bitly and Pastebin (spread over a number of accounts) to direct and host their attack […]
The World Has Changed – Security Should Transform to Stay Ahead
5 min read
Disruption creates two distinct sets of challenges for security professionals. The security team has to keep up with strategic IT demands, and do daily battle with a sophisticated threat landscape.
Real Users Speak: Cisco and the Elements of Robust Email Security
3 min read
Real users explain how to implement robust protection with Cisco Email Security’s sophisticated filtering, built-in intelligence and policy definition and enforcement capabilities.
Cisco Integrates Security to Save You Time
4 min read
Cisco SecureX integrates security to eliminate complexity, optimize your security experience, and save you time.
Building a security platform powered by advanced analytics
5 min read
The Cisco SecureX platform brings together the best of our broad and integrated security technologies, including security analytics.
Securing the remote work environment
6 min read
As organizations adopt remote working, how should they evaluate their security posture? And what are the top threats they may face?
Threat Roundup for April 17 to April 24
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 17 and Apr 24. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Threat Spotlight: MedusaLocker
1 min read
By Edmund Brumaghin, with contributions from Amit Raut. Overview MedusaLocker is a ransomware family that has been observed being deployed since its discovery in 2019. Since its introduction to the threat landscape, there have been several variants observed. However, most of the functionality remains consistent. The most notable differences are changes to the file extension […]
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services