Cognitive Intelligence

August 9, 2022

SECURITY

Raspberry Robin: Highly Evasive Worm Spreads over External Disks

1 min read

During our threat hunting exercises in recent months, we’ve started to observe a distinguishing pattern of msiexec.exe usage across different endpoints.

May 12, 2022

SECURITY

Network Footprints of Gamaredon Group

6 min read

This blog post contains observations of Cognitive Intelligence Team over Gamaredon Group's activities during the month of March 2022

March 28, 2022

SECURITY

Emotet is Back

5 min read

We summarise in this blog Emotet threat, it’s lifecycle and typical detectable patterns. In the second part of the blog we show how to use GTA.

December 17, 2021

SECURITY

How to Respond to Apache Log4j using Cisco Secure Analytics

11 min read

Security professionals are working to assess their exposure to Apache Log4j vulnerability (CVE-2021-44228). The following guide on how to respond is here.

March 24, 2021

SECURITY

What are you missing when you don’t enable global threat alerts?

3 min read

Network telemetry can identify user behaviors, malicious tools installed in enterprise environments, and malware itself. Are you applying a global view to your network? If not, read on to learn more.

February 27, 2019

SECURITY

Cisco Security at Work: Threatwall at Mobile World Congress 2019

3 min read

The Threatwall is a live display of threats on open conference wireless networks wherever it is deployed, such as Cisco Live or WMC, providing valuable insights on network traffic trends.

September 29, 2018

SECURITY

Defeating Polymorphic Malware with Cognitive Intelligence. Part 2: Command Line Argument Clustering

7 min read

Command Line Argument Clustering algorithm is an innovative weapon that works for security analysts to help uncover evasive malware and morphing threats in their environments.