malware
In Pursuit of Invisibility: Fileless Malware
3 min read
A recent survey asked whether people would prefer to the ability to fly or to be invisible. Silly question, but why they chose what they did provided unique insights.
The big myth about security patch management
3 min read
There's a big myth out there about patching. Is it an easy fix? The truth is, effective security patch management for your network can be difficult. Is your network secure?
My Little FormBook
1 min read
Cisco Talos has been tracking a new campaign involving the FormBook malware since May 2018 that utilizes four different malicious documents in a single phishing email. FormBook is an inexpensive...
NavRAT Uses US-North Korea Summit As Decoy For Attacks In South Korea
1 min read
Talos discovered a malicious Hangul Word Processor (HWP) document targeting Korean users. If a malicious document is opened, a remote access trojan, "NavRAT," downloads with command execution and keylogging capabilities.
3 Non-Negotiables for an Effective Data Center Security & Workload Protection Strategy
4 min read
We know that big data is big business… And the use of on-premises and public cloud infrastructure is growing, according to the Cisco 2018 Security Capabilities Benchmark...
IcedID Banking Trojan Teams up with Ursnif/Dreambot for Distribution
1 min read
This post was authored by Ross Gibb, with research contributions from Daphne Galme of Cisco, and Michael Gorelik of Morphisec, a Cisco Security Technical Alliance partner. In November 2017...
The Surprisingly High Cost of Malware in Schools — And How to Stop It
1 min read
Compared to banks and enterprise corporations and government agencies, who would think that schools would be prime targets for cyberattacks? Surprisingly, education is actually the industry most at risk of...
Olympic Destroyer Takes Aim At Winter Olympics
1 min read
The Winter Olympics this year is being held in Pyeongchang, South Korea. The Guardian, a UK Newspaper reported an article that suggested the Olympic computer systems suffered technical issues during...
Cryptojacking: Hijacking your computer resources
3 min read
Your internet connection is slower than usual, your PC is also very slow, and you notice that your CPU fan is running faster when you are on a given website. All the above symptoms indicate that you could be a victim of cryptojacking. This is a new kind of menace in which malicious users or […]
3