Cognitive Intelligence

July 13, 2017

SECURITY

Are You The Lucky One? Sometimes Luck Can Bring You Malware

For more than two decades, malicious actors have been evolving their Phishing techniques to effectively achieve their goals. From poorly crafted scams to extremely well crafted documents, Phishing attacks keep being a very effective...

May 24, 2017

SECURITY

The light is green! But is it safe to go? Abusing users’ faith in HTTPS

This post was authored by Anna Shirokova and Ivan Nikolaev John Smith had a lot of friends and liked to travel. One day he got an email that read: "Money has been sent...

January 19, 2017

SECURITY

Closing One Learning Loop: Using Decision Forests to Detect Advanced Threats

This blog post was authored by Veronica Valeros and Lukas Machlica Malicious actors are constantly evolving their techniques in order to evade detection. It is not only the sophistication or the rapid...

December 14, 2016

SECURITY

In plain sight: Credential and data stealing adware

Adware has been around for a while now. In principle, displaying advertising in order to finance your software is not necessarily something bad. Users are used to seeing advertising everywhere: newspapers, magazines, and websites. When...

October 20, 2016

SECURITY

Piecing Together Malicious Behavior in Encrypted Traffic

This post was authored by Jan Kohout, Veronica Valeros and Petr Somol. Increasing adoption of encryption in web communication significantly contributes to protection of users' privacy. However, it also brings...

September 19, 2016

SECURITY

Cognitive Threat Analytics: Turn Your Proxy Into Security Device

This post was authored by Veronica Valeros, Petr Somol, Martin Rehak and Martin Grill, on behalf of the whole CTA team. Some of us still intuitively believe that our extensively...

July 29, 2016

SECURITY

Introducing executive dashboards in CTA

No security risk assessment is complete without the executive summary section. Something that can answer the high level questions security teams get asked including “how secure are we?”, “what threats...

February 10, 2016

SECURITY

DNSChanger Outbreak Linked to Adware Install Base

[Ed. note: This post was authored by Veronica Valeros, Ross Gibb, Eric Hulse, and Martin Rehak] Late last autumn, the detector described in one...

December 14, 2015

SECURITY

Malware stealing gigabytes of your data as seen by Cognitive Threat Analytics

This post is authored by Gayan de Silva and Martin Pospisil. Overview Recently, about 50 users across 20 companies were alarmed by the Cisco Cognitive Threat Analytics (CTA) about...