Cryptomining

November 13, 2019

THREAT RESEARCH

Hunting For LolBins

Attackers’ trends tend to come and go. But one popular technique we’re seeing at this time is the use of living-off-the-land binaries — or “LoLBins”. LoLBins are used by different actors combined with fileless malware and legitimate cloud services to improve chances of staying undetected within an organisation, usually during post-exploitation attack phases. Living-off-the-land tactics […]

September 17, 2019

THREAT RESEARCH

Cryptocurrency miners aren’t dead yet: Documenting the voracious but simple “Panda”

A new threat actor named “Panda” has generated thousands of dollars worth of the Monero cryptocurrency through the use of remote access tools (RATs) and illicit cryptocurrency-mining malware.

July 1, 2019

THREAT RESEARCH

RATs and stealers rush through “Heaven’s Gate” with new loader

Malware is constantly finding new ways to avoid detection. This doesn't mean that some will never be detected, but it does allow adversaries to increase the period of time between...

June 10, 2019

SECURITY

Cisco Encrypted Traffic Analytics: Necessity Driving Ubiquity

Cisco's Encrypted Traffic Analytics (ETA) ensures the privacy of our most important business data and allowing us to detect malware that uses that same privacy to cover its tracks.

April 15, 2019

SECURITY

Black Hat Asia 2019: Watch Out for the Secondary Payload

Cisco Security was a proud technology partner in the Network Operations Center (NOC) at Black Hat Asia, providing secure and open Internet access to attendees. See what the NOC discovered.

February 27, 2019

SECURITY

Cisco Security at Work: Threatwall at Mobile World Congress 2019

The Threatwall is a live display of threats on open conference wireless networks wherever it is deployed, such as Cisco Live or WMC, providing valuable insights on network traffic trends.

February 22, 2019

SECURITY

Malicious Cryptomining is Exploding. Are you at risk?

With a 19x increase in crypto related traffic in the last nine months, it's time to find out if computing resources in your organization are being used without your knowledge.

February 14, 2019

SECURITY

Today’s critical threats: A Cisco Security threat report

Download a copy of our first 2019 Threat Report, Defending against today’s critical threats today and start prepping for the things that are likely to come.

December 11, 2018

SECURITY

Cryptomining: A sheep or a wolf?

One of, if not the, most prominent motivators for threat actors is money. Whether it’s botnet owners renting out their services for DDoS attacks, tech support scammers cold-calling people to...