email security

May 26, 2017

SECURITY

How to protect against the most advanced email-based attacks

3 min read

With over 100 billion corporate emails exchanged each day, it’s no wonder that email remains a major threat vector. Organizations around the globe depend on email to quickly communicate and collaborate. And as long as organizations use email to send and receive files, communicate and interact, malicious files, links and attachments will continue to plague […]

May 23, 2017

THREAT RESEARCH

Modified Zyklon and plugins from India

1 min read

Streams of malicious emails Talos inspects every day usually consist of active spamming campaigns for various ransomware families, phishing campaigns and the common malware family suspects such as banking Trojans and bots.. It is however often more interesting to analyze campaigns smaller in volume as they might contain more interesting malware. A few weeks ago […]

March 3, 2017

THREAT RESEARCH

Malware Round-up For The Week of Feb 27 – Mar 3

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed over the past week. Unlike our other posts, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically protected from […]

October 18, 2016

SECURITY

Combating Email Spoofing with Cisco Email Security Forged Email Detection

2 min read

In April we covered the description of Email Spoofing using Microsoft Outlook, but what about detecting and mitigating it on the Mail Transfer Agent (MTA)? There are multiple technologies that have attempted to address the issues surrounding spoofed emails on the MTA, but they all have shortcomings that can limit their usefulness. DKIM, or Domain […]

October 6, 2016

SECURITY

Phishing for Threat Intelligence: Using Your Spam Quarantine for the Greater Good

3 min read

Cisco’s OpenDNS enables phishing awareness by helping organizations learn about commonly identifiable tactics used by scammers.

August 1, 2016

SECURITY

Attackers Evolve Tactics to Infiltrate Your Network via Email

3 min read

Email continues to be the number one business communication method and is still the number one threat vector. This ubiquitous communication technology also provides an effective path for criminal actors. Today, customers are more concerned about targeted and other advanced attacks rather than spam capture rates. Well-funded, educated criminals employ a wide range of attack […]

June 21, 2016

SECURITY

Protect against today’s attacks with AsyncOS 10.0 for Cisco Email Security

2 min read

New email security release adds spoofing protection, auto-remediation of malware for Office 365 customers, AMP Private Cloud, and more. There’s been a spike in ransomware and spear-phishing attacks in the last several months. Read any news outlet and you’ll find examples of health records and other valuable data being locked up, employees duped into releasing […]

April 5, 2016

SECURITY

What is Email Spoofing and How to Detect It

3 min read

What is Email Spoofing? Email spoofing is the creation of email messages with a forged sender address for the purpose of fooling the recipient into providing money or sensitive information.  For example: a sender 401k_Services@yourcompany.com sends a message to your business email address stating that you have one day to log into your account to take […]

March 4, 2016

SECURITY

Walking the Tightrope of Security and Usability

3 min read

Here at the RSA Conference 2016, the theme this year is Connect to Protect. It is a fitting theme for a gathering of security professionals, given the widespread adoption of...