Cognitive Intelligence

February 10, 2016

SECURITY

DNSChanger Outbreak Linked to Adware Install Base

4 min read

[Ed. note: This post was authored by Veronica Valeros, Ross Gibb, Eric Hulse, and Martin Rehak] Late last autumn, the detector described in one...

December 14, 2015

SECURITY

Malware stealing gigabytes of your data as seen by Cognitive Threat Analytics

3 min read

This post is authored by Gayan de Silva and Martin Pospisil. Overview Recently, about 50 users across 20 companies were alarmed by the Cisco Cognitive Threat Analytics (CTA) about...

October 15, 2015

SECURITY

Angler for Beginners in 34 Seconds

3 min read

Post authored by Martin Rehak, Veronica Valeros, Martin Grill and Ivan Nikolaev. In order to complement the comprehensive information about the Angler exploit kit from our Talos colleagues [

September 23, 2015

SECURITY

Cognitive Research: Fake Blogs Generating Real Money

5 min read

Summary In the past several months Cisco Cognitive Threat Analytics (CTA) researchers have observed a number of blog sites using either fake content or content stolen from other sites to...

September 11, 2015

SECURITY

Cognitive Threat Analytics – Transparency in Advanced Threat Research

2 min read

Cisco Cognitive Threat Analytics is a security analytics product that discovers breaches in Cisco customer's networks by means of advanced statistical analysis, machine learning and global correlation...

September 3, 2015

THREAT RESEARCH

Cognitive Research: Learning Detectors of Malicious Network Traffic

9 min read

This post was authored by Karel Bartos, Vojtech Franc, & Michal Sofka. Malware is constantly evolving and changing. One way to identify malware is by analyzing the...

February 12, 2015

THREAT RESEARCH

Bad Browser Plug-ins Gone Wild: Malvertising, Data Exfiltration, and Malware, Oh my!

4 min read

This post was authored by Fred Concklin, William Largent,  Martin Rehak,  Michal Svoboda, and Veronica Valeros. During an average day of surfing the web via computer, smartphones, and tablets, we...

June 24, 2014

SECURITY

Steganographic Key Leakage Through Payload Metadata

3 min read

Steganography is the ancient art of invisible communication, where the goal is to hide the very fact that you are trying to hide something. It adds another layer of protection...