In our first blog, we introduced the Magic of Mitigations. They’re the key to getting started with MITRE ATT&CK. Now let’s look at some of the most magical ones, starting today with Behavior Prevention on Endpoint (M1040), Exploit
When learning new things, sometimes we need to slow down and take it all in. For me, understanding MITRE ATT&CK was like that. Sure, the notion of thinking like an attacker made sense, and its structure was clear. Then came the “now what?” moment.
Cisco's Computer Security Incident Response Team (CSIRT) detected a large and ongoing malspam campaign leveraging the .IMG file extension to bypass automated malware analysis tools and infect machines with a variety of Remote Access Trojans. During
Use the latest Cisco cybersecurity report to understand the current cyber threat landscape, and test how your organization would perform against these attacks.
Calico Jack, Captain Blood, and Blackbeard. So many recognizable stories, books, and movies have been made about the period of stealing and looting exemplified by the golden age of piracy....
Talos has compiled a list of 74 groups on Facebook promising to carry out an array of cyber dirty deeds, and we are tracking their potential impact on Cisco customers.
"What’s our exposure?” is a question that requires an urgent and conclusive answer as soon as a potential threat is discovered. Learn more on proactive threat hunting to go from exposed to empowered.
Thinking of summer reading with digital teaching and learning in mind? Here are a few suggestions. Some are serious—think cybersecurity and IT modernization—but others are inspirational and fun.