malware
How to Monitor Network Traffic: Findings from the Cisco Cyber Threat Trends Report
4 min read
The Cisco Cyber Threat Trends report examines malicious domains for trends and patterns. See what the data tells us about the threat landscape.
Agniane Stealer: Information stealer targeting cryptocurrency users
7 min read
Agniane Stealer is a malware that targets credentials and documents, actively sold on Telegram, with ConfuserEX obfuscations, presents novel C2 protocol.
Tackling phishing in New Zealand
5 min read
We propose strategies of how New Zealand organisations can close their security gaps with protection against phishing, stolen credentials and other threats.
Letter from Oslo: The NDC Security 2022 Conference
5 min read
When you find yourself on a business trip and forget the code to your corporate AmEx, you know you haven’t been on the road for a while. NDC Security was a great way to get myself back into the conference configuration. I learned a lot at this show and had a great time giving two talks.
Securing industrial networks: it’s a journey
3 min read
Learn how Cisco tools can help keep your industrial network secure.
Threat Roundup for March 19 to March 26
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between March 19 and March 26. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.
Threat Roundup for March 12 to March 19
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between March 12 and March 19. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.
Threat Roundup for March 5 to March 12
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between March 5 and March 12. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.
Threat Roundup for February 26 to March 5
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between February 26 and March 5. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.