Cisco Cognitive Threat Analytics

October 20, 2016

SECURITY

Piecing Together Malicious Behavior in Encrypted Traffic

9 min read

This post was authored by Jan Kohout, Veronica Valeros and Petr Somol. Increasing adoption of encryption in web communication significantly contributes to protection of users' privacy. However, it also brings...

September 19, 2016

SECURITY

Cognitive Threat Analytics: Turn Your Proxy Into Security Device

8 min read

This post was authored by Veronica Valeros, Petr Somol, Martin Rehak and Martin Grill, on behalf of the whole CTA team. Some of us still intuitively believe that our extensively...

July 29, 2016

SECURITY

Introducing executive dashboards in CTA

2 min read

No security risk assessment is complete without the executive summary section. Something that can answer the high level questions security teams get asked including “how secure are we?”, “what threats...

June 8, 2016

SECURITY

AMP for Endpoints + Cognitive Threat Analytics = More Visibility than Ever Before

2 min read

No matter how many security tools you deploy to defend your organization, malware is going to get in. You need to see it if you want any chance of stopping...

February 10, 2016

SECURITY

DNSChanger Outbreak Linked to Adware Install Base

4 min read

[Ed. note: This post was authored by Veronica Valeros, Ross Gibb, Eric Hulse, and Martin Rehak] Late last autumn, the detector described in one...

February 2, 2016

SECURITY

Find Advanced Threats with Cisco Cognitive Threat Analytics

2 min read

Attackers are constantly innovating, employing more sophisticated techniques to compromise organizations and gain access to other parts of the network and sensitive data including proprietary information, trade secrets, and of...

December 14, 2015

SECURITY

Malware stealing gigabytes of your data as seen by Cognitive Threat Analytics

3 min read

This post is authored by Gayan de Silva and Martin Pospisil. Overview Recently, about 50 users across 20 companies were alarmed by the Cisco Cognitive Threat Analytics (CTA) about...

October 15, 2015

SECURITY

Angler for Beginners in 34 Seconds

3 min read

Post authored by Martin Rehak, Veronica Valeros, Martin Grill and Ivan Nikolaev. In order to complement the comprehensive information about the Angler exploit kit from our Talos colleagues [

September 23, 2015

SECURITY

Cognitive Research: Fake Blogs Generating Real Money

5 min read

Summary In the past several months Cisco Cognitive Threat Analytics (CTA) researchers have observed a number of blog sites using either fake content or content stolen from other sites to...