Advanced Malware Protection

June 14, 2016

SECURITY

Advanced Malware Evasion Techniques HTTP-Evader

1 min read

Malware doesn’t play by the rules, so today’s IT infrastructure needs to provide several layers of defense for end-users.  Some of the more common devices used to protect modern networks are Intrusion Prevention systems (IPS) and Firewalls. In recent years, there has been a lot of research on how evasion techniques bypass Intrusion Prevention systems […]

March 29, 2016

SECURITY

The Power of an Integrated Threat Defense

2 min read

At RSA this year and last, Marty Roesch, VP and Chief Architect for Cisco’s Security Business Group, talked about the need of an integrated threat defense to drive systemic response. The idea is to correlate and analyze data and telemetry from the multiple security technologies that organizations have deployed across different control points. And then […]

March 16, 2016

THREAT RESEARCH

Teslacrypt 3.0.1 – Tales from the Crypt(o)!

1 min read

This post is authored by Andrea Allievi and Holger Unterbrink Executive Summary Ransomware is malicious software that is designed to hold users’ files (such as photos, documents, and music) for ransom by encrypting their contents and demanding the user pay a fee to decrypt their files. Typically, users are exposed to ransomware via email phishing campaigns and exploit […]

February 2, 2016

SECURITY

Cisco AMP for Endpoints Adds New Features

2 min read

The threat landscape is ever-changing. Attackers continue to innovate and refine their tactics, and malware is more sophisticated than ever. New threats are surfacing every day, like the Angler exploit kit and the SSHPsychos DDoS attack. According to the 2016 Cisco Annual Security Report, ransomware is exploding, Adobe Flash vulnerabilities continue to be popular with […]

November 9, 2015

SECURITY

Pushing Security from Edge to Endpoint

3 min read

On November 3rd, Cisco announced that we are extending our Security Everywhere strategy with new solutions and services aimed at helping our customers gain greater visibility, context, and control from the cloud to the network to the endpoint. Providing organizations more visibility means being able to see all their systems, not just Windows but Mac, […]

October 15, 2015

SECURITY

Angler for Beginners in 34 Seconds

3 min read

Post authored by Martin Rehak, Veronica Valeros, Martin Grill and Ivan Nikolaev. In order to complement the comprehensive information about the Angler exploit kit from our Talos colleagues [

September 30, 2015

THREAT RESEARCH

Down the Rabbit Hole: Botnet Analysis for Non-Reverse Engineers

9 min read

This post is authored by Earl Carter & Holger Unterbrink. Overview Talos is often tasked with mapping the backend network for a specific piece of malware. One approach is to first reverse engineer the sample and determine exactly how it operates. But what if there is no time or resources to take the sample apart? […]

August 5, 2015

SECURITY

Continuous Analysis Yields Continuous Leadership Against Advanced Threats

2 min read

Organizations today have no shortage of challenges when it comes to cyber security and their growing IT infrastructure. Not only is the frequency and sophistication of malware attacks on the rise, but with the proliferation of mobility, BYOD, IoT, and cloud services; the number of entry points an attacker has into the network grows exponentially […]

April 29, 2015

DATA CENTER

Enhance Data Center Security and Automation with New Cisco ACI Features and Partners

3 min read

We’ve been talking for a while about Cisco ACI’s leadership in SDN security features (like here), and in the design of our fine-grained security policy enforcement between individual workloads,...