phishing
“Spark Joy” With New 12.0 Email Security Features & Videos
When you see “software update available,” does it spark joy? For many of us, the answer is a resounding “no.” But, don’t be fooled into thinking that our new 12.0...
Email – From Novelty to Nefarious
How a revolutionary technology was usurped for evil, and what we can do about it Since its inception, email has gone from a novelty, to a necessity, to at...
Hiding in Plain Sight
Talos has compiled a list of 74 groups on Facebook promising to carry out an array of cyber dirty deeds, and we are tracking their potential impact on Cisco customers.
You’ve Got (Compromised) Mail!
There are two kinds of people in this world: those who have been affected by Business Email Compromise (BEC) scams and those who don’t know they have been hit with...
Cisco Threat Response with Email Security Integration: Harmonizing Your Security Products
Those of us who have been in security for more than 20 years are very familiar with the assertion that security is a process. For me, security has always been...
Going with what works: The state of phishing
Go phish! Cyber-attacks are big business. And the bad guys know that in any business, the more revenue you can generate with least investment means larger profits. It makes...
Phishing 101: Protection for Everyone
For individuals, these simple steps can help protect you. They are not a complete solution, but they are helpful.
Gozi ISFB Remains Active in 2018, Leverages “Dark Cloud” Botnet For Distribution
Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years. Banking trojans are a widely distributed type of...
Why cybersecurity in the workplace is everyone’s business
“If Microsoft calls and asks you for your password…it’s not real, ” said Steve LeBlond, VP of Technology and CTO of Ochsner Health System, while speaking at our Digital Health Summit on October 3. “We [Information Technology] will never ask you to log us in.” Steve was talking about phishing attacks, one of the biggest […]