AMP Threat Grid

April 15, 2019

SECURITY

Black Hat Asia 2019: Watch Out for the Secondary Payload

5 min read

Cisco Security was a proud technology partner in the Network Operations Center (NOC) at Black Hat Asia, providing secure and open Internet access to attendees. See what the NOC discovered.

February 20, 2019

NETWORKING

New Perspectives on Software-Defined WAN

7 min read

The integration of SD-WAN with cloud management functionality into the Cisco family of routers in 2018 excited many of our customers. So what can we look forward to as this technology enters its next phase?

February 10, 2017

SECURITY

Indicators of Compromise and where to find them

4 min read

Indicators of Compromise (“IOC”) are used to suggest a system has been affected by some form of malware. An Indicator of Compromise can be anything from a file name to the behavior observed while malware is actively running on an infected system. Where do they look? Social media, new feeds, industry reports, Threat Grid sample […]

December 19, 2016

SECURITY

To be Effective, Security Needs to Be a Force Multiplier

4 min read

Effective security is simple, open, and automated.  We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard to figure out even in elite operations. What […]

September 19, 2016

SECURITY

Cognitive Threat Analytics: Turn Your Proxy Into Security Device

8 min read

This post was authored by Veronica Valeros, Petr Somol, Martin Rehak and Martin Grill, on behalf of the whole CTA team. Some of us still intuitively believe that our extensively...

September 13, 2016

SECURITY

H1N1: Technical analysis reveals new capabilities

7 min read

This blog is the first in a 3 part series that will provide an in-depth technical analysis on the H1N1 malware. I’ll be looking at how H1N1 has evolved, its obfuscation, analyzing its execution including new information stealing and user account control bypass capabilities, and finally exploring how we are both using and influencing security tools […]

August 17, 2016

SECURITY

CryptXXX Technical Deep Dive

10 min read

0.0 Introduction: In our previous post we discussed the AMP ThreatGrid Research and Efficacy Team’s continuous support for Ransomware attack vectors, generic behavior detection of un-discovered variants, and the creation of behavioral indicators once new variants are identified. In this post we’ll be discussing one of the more prevalent variants to surface in the wake […]

August 8, 2016

SECURITY

The General Behavior of Ransomware

5 min read

This is the first in a series of blogs about advanced malware Behavioral Indicators Morph Over Time A large part of Threat Grid’s efficacy in determining the nature of a submitted file is through the use of over 675 indicators to identify malware. The initial indicators created for AMP Threat Grid sought to identify strictly […]

November 9, 2015

SECURITY

Pushing Security from Edge to Endpoint

3 min read

On November 3rd, Cisco announced that we are extending our Security Everywhere strategy with new solutions and services aimed at helping our customers gain greater visibility, context, and control from the cloud to the network to the endpoint. Providing organizations more visibility means being able to see all their systems, not just Windows but Mac, […]