malware
Tackling phishing in New Zealand
We propose strategies of how New Zealand organisations can close their security gaps with protection against phishing, stolen credentials and other threats.
Letter from Oslo: The NDC Security 2022 Conference
When you find yourself on a business trip and forget the code to your corporate AmEx, you know you haven’t been on the road for a while. NDC Security was a great way to get myself back into the conference configuration. I learned a lot at this show and had a great time giving two talks.
Securing industrial networks: it’s a journey
Learn how Cisco tools can help keep your industrial network secure.
Threat Roundup for March 19 to March 26
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between March 19 and March 26. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.
Threat Roundup for March 12 to March 19
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between March 12 and March 19. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.
Threat Roundup for March 5 to March 12
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between March 5 and March 12. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.
Threat Roundup for February 26 to March 5
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between February 26 and March 5. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.
Threat Roundup for February 19 to February 26
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between February 19 and February 26. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
How Does Triton Attack Triconex Industrial Safety Systems?
In this technical report, Cisco's IoT Security Lab describes one of the most famous attacks on Triconex industrial systems. Learn how your industrial operations could be exposed.