phishing

May 1, 2019

SECURITY

“Spark Joy” With New 12.0 Email Security Features & Videos

When you see “software update available,” does it spark joy? For many of us, the answer is a resounding “no.” But, don’t be fooled into thinking that our new 12.0...

April 18, 2019

SECURITY

Email – From Novelty to Nefarious

How a revolutionary technology was usurped for evil, and what we can do about it Since its inception, email has gone from a novelty, to a necessity, to at...

April 5, 2019

THREAT RESEARCH

Hiding in Plain Sight

Talos has compiled a list of 74 groups on Facebook promising to carry out an array of cyber dirty deeds, and we are tracking their potential impact on Cisco customers.

December 13, 2018

SECURITY

You’ve Got (Compromised) Mail!

There are two kinds of people in this world: those who have been affected by Business Email Compromise (BEC) scams and those who don’t know they have been hit with...

December 3, 2018

SECURITY

Cisco Threat Response with Email Security Integration: Harmonizing Your Security Products

Those of us who have been in security for more than 20 years are very familiar with the assertion that security is a process. For me, security has always been...

November 1, 2018

SECURITY

Going with what works: The state of phishing

Go phish! Cyber-attacks are big business. And the bad guys know that in any business, the more revenue you can generate with least investment means larger profits. It makes...

October 3, 2018

SECURITY

Phishing 101: Protection for Everyone

For individuals, these simple steps can help protect you. They are not a complete solution, but they are helpful.

March 6, 2018

THREAT RESEARCH

Gozi ISFB Remains Active in 2018, Leverages “Dark Cloud” Botnet For Distribution

Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years. Banking trojans are a widely distributed type of...

October 12, 2017

HEALTHCARE

Why cybersecurity in the workplace is everyone’s business

“If Microsoft calls and asks you for your password…it’s not real, ” said Steve LeBlond, VP of Technology and CTO of Ochsner Health System, while speaking at our Digital Health Summit on October 3. “We [Information Technology] will never ask you to log us in.” Steve was talking about phishing attacks, one of the biggest […]