New Research Paper: Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem
Detection of malware is a constant battle between the technologies designed to detect and prevent malware and the authors creating them. One common technique adversaries leverage is packing binaries. Packing an executable is similar to applying compression or encryption and can inhibit the ability of some technologies to detect the packed malware. High entropy is […]
Blocking Cryptocurrency Mining with Cisco Talos
The value of cryptocurrencies has fluctuated wildly, but the value is still high enough to garner a lot of attention, both legitimate and malicious. Most of the malicious...
OpenSOC: An Open Commitment to Security
According to the Breach Level Index, between July and September of this year, an average of 23 data records were lost or stolen every second – close to two million records every day.1 This data loss will continue as attackers become increasingly sophisticated in their attacks. Given this stark reality, we can no longer rely on […]
Detecting Payment Card Data Breaches Today to Avoid Becoming Tomorrow’s Headline
A few months ago we discussed the various ways that consumer PII is compromised. The recent attacks against Target and Neiman Marcus illustrate the constant threat that payment card accepting retailers of all sizes face. Yesterday Reuters reported that similar breaches over the holidays affected “at least three other well-known U.S. retailers”. Given the current […]
Interference Detection and Mitigation with Cisco CleanAir
The previous blog on CleanAir went in depth on how MSE uses CleanAir information to locate interferers and the impact zone for each interferer. This blog takes a step...