Cisco Blogs
Voice Search is currently unavailable
Powered by Google Web Speech API
We didn't hear that. Try again.
When autocomplete results are available use up and down arrows to review and enter to select

dga

September 3, 2015

THREAT RESEARCH

Cognitive Research: Learning Detectors of Malicious Network Traffic

9 min read

This post was authored by Karel Bartos, Vojtech Franc, & Michal Sofka. Malware is constantly evolving and changing. One way to identify malware is by analyzing the...

August 8, 2015

THREAT RESEARCH

Research Spotlight: Detecting Algorithmically Generated Domains

4 min read

This post was authored by Mahdi Namazifar and Yuxi Pan Once a piece of malware has been successfully installed on a vulnerable system one of the first orders of business is for the malware to reach out to the remote command-and-control (C&C) servers in order to receive further instructions, updates and/or to exfiltrate valuable user […]

March 30, 2015

THREAT RESEARCH

Threat Spotlight: Dyre/Dyreza: An Analysis to Discover the DGA

12 min read

This post was authored by Alex Chiu & Angel Villegas. Overview Banking and sensitive financial information is a highly coveted target for attackers because of the high value and obvious financial implications.  In the past year, a large amount of attention has been centered on Point of Sale (PoS) malware due to its major role in […]