Threat Roundup for January 10 to January 17
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Jan 10 and Jan 17. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Threat Roundup for January 3 to January 10
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Jan 3 and Jan 10. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
If Cybersecurity Was a Christmas Dinner
As I thought about how many elements there were to consider when planning a Christmas dinner and how they could also be aligned to a security strategy for modern consumers and businesses. Security, as with a Christmas dinner, is not just about the food but the entire experience and process that surrounds it.
Combat Modern Day Plague in Security with Email Security and Cisco Threat Response Integration
Learn how Cisco Threat Response automates integration across your security products, including Email Security to provide a seamless experience that serves as a foundation for fast, efficient incident investigation and response. Get contextual awareness and correlation with expanded insights needed to protect users from threats in the incoming emails.
Incident Response Lessons From Recent Maze Ransomware Attacks
This post authored by JJ Cummings and Dave Liebenberg This year, we have been flooded with reports of targeted ransomware attacks. Whether it’s a city, hospital, large- or medium-sized enterprise — they are all being targeted. These attacks can result in significant damage, cost, and have many different initial infection vectors. Recently, Talos Incident Response has been engaged […]
The Circus is Coming to Town and Why You Should Stay Away
Cisco's integrated security portfolio underscored by Cisco Threat Response and intelligence sharing delivers comprehensive coverage and integration excellence across endpoint, cloud and email security to lower time to remediation (TTR).
Cryptocurrency miners aren’t dead yet: Documenting the voracious but simple “Panda”
A new threat actor named “Panda” has generated thousands of dollars worth of the Monero cryptocurrency through the use of remote access tools (RATs) and illicit cryptocurrency-mining malware.
Take bigger risks with the right trusted advisors
When you have a strong incident response plan in place, you are able to take bigger risks, but where do you start if you don’t have a plan?