esa
Empowering Defenders: AMP Unity and Cisco Threat Response
5 min read
Steadily, more than two thousand customers have incorporated Threat Response and AMP Unity into their daily workflows.
TechWiseTV dives into Enterprise Service Automation and Easy QoS
3 min read
In this episode, Cisco’s Prakash Rajamani demonstrates how orchestration tools like Enterprise Service Automation (ESA) can bring repeatable, consistent, and scalable processes to your virtualized branch deployment. Later, Ramit Kanda shows a dramatically simple way that ESA can be used to control QoS on your network: from wired to wireless, and through the WAN.
New Email Security Release Adds Graymail Protection, Web Interaction Tracking, AMP Threat Grid, and More
2 min read
Each day more than 100 billion corporate email messages are exchanged1. Who doesn’t need to do a little housekeeping and eliminate unwanted emails? But you need to think twice before you click on “unsubscribe.” As you likely read in the 2015 Cisco Annual Security Report, attackers are using applications users inherently trust or view as benign, […]
Cisco Email Security Stays Ahead of Current Threats by Adding Stronger Snowshoe Spam Defense, AMP Enhancements, and More …
2 min read
If you read the recently released Cisco Annual Security Report, you will have learned how spammers have adopted a “Snowshoe” strategy, using a large number of IP addresses with a low message volume per IP address, to send spam, preventing some spam systems from sinking the spam. This yielded a 250 percent increase in spam […]
Threat Spotlight: “Kyle and Stan” Malvertising Network 9 Times Larger Than Expected
3 min read
This post was authored by Armin Pelkmann. On September 8th, Cisco’s Talos Security Intelligence & Research Group unveiled the existence of the “Kyle and Stan” Malvertisement Network. The network was responsible for placing malicious advertisements on big websites like amazon.com, ads.yahoo.com, www.winrar.com, youtube.com and 70 other domains. As it turns out, this was just the tip of the iceberg. Ongoing research now reveals […]
Threat Spotlight: “Kyle and Stan” Malvertising Network Threatens Windows and Mac Users With Mutating Malware
9 min read
This post was authored by Shaun Hurley, David McDaniel and Armin Pelkmann. Update 2014-09-22: Updates on this threat can be found here Have you visited amazon.com, ads.yahoo.com, www.winrar.com, youtube.com, or any of the 74 domains listed below lately? If the answer is yes, then you may have been a victim to the “Kyle and Stan” […]
Snowshoe Spam Attack Comes and Goes in a Flurry
4 min read
This post is co-authored by Jaeson Schultz and Craig Williams. Every so often, we observe certain spam campaigns that catch our interest. On August 15, we observed a particular spam campaign that caught our attention because it was using “snowshoe” spam techniques combined with PDF exploitation. While neither of these techniques are new, we have seen a growing […]
Botnets Riding Rails to your Data Center
3 min read
Cisco Security Intelligence Operations is tracking reports of ongoing exploitation of a vulnerability in the popular web application framework Ruby on Rails that creates a Linux-based botnet. The vulnerability dates back to January 2013 and affects Ruby on Rails versions prior to 3.2.11, 3.1.10, 3.0.19, and 2.3.15. Cisco Security Intelligence Operations’ has previously published an […]
5