If Cybersecurity Was a Christmas Dinner
As I thought about how many elements there were to consider when planning a Christmas dinner and how they could also be aligned to a security strategy for modern consumers and businesses. Security, as with a Christmas dinner, is not just about the food but the entire experience and process that surrounds it.
Combat Modern Day Plague in Security with Email Security and Cisco Threat Response Integration
Learn how Cisco Threat Response automates integration across your security products, including Email Security to provide a seamless experience that serves as a foundation for fast, efficient incident investigation and response. Get contextual awareness and correlation with expanded insights needed to protect users from threats in the incoming emails.
Incident Response Lessons From Recent Maze Ransomware Attacks
This post authored by JJ Cummings and Dave Liebenberg This year, we have been flooded with reports of targeted ransomware attacks. Whether it’s a city, hospital, large- or medium-sized enterprise — they are all being targeted. These attacks can result in significant damage, cost, and have many different initial infection vectors. Recently, Talos Incident Response has been engaged […]
The Circus is Coming to Town and Why You Should Stay Away
Cisco's integrated security portfolio underscored by Cisco Threat Response and intelligence sharing delivers comprehensive coverage and integration excellence across endpoint, cloud and email security to lower time to remediation (TTR).
Cryptocurrency miners aren’t dead yet: Documenting the voracious but simple “Panda”
A new threat actor named “Panda” has generated thousands of dollars worth of the Monero cryptocurrency through the use of remote access tools (RATs) and illicit cryptocurrency-mining malware.
Let’s Destroy Democracy
Election security through an adversary’s eyes This post was authored by Matt Olney
Vulnerability Spotlight: Remote code execution vulnerabilities in Simple DirectMedia Layer
Simple DirectMedia Layer contains two vulnerabilities that could an attacker to remotely execute code on the victim’s machine. Both bugs are present in the SDL2_image library, which is used for...