phishing
“Spark Joy” With New 12.0 Email Security Features & Videos
2 min read
When you see “software update available,” does it spark joy? For many of us, the answer is a resounding “no.” But, don’t be fooled into thinking that our new 12.0...
Email – From Novelty to Nefarious
6 min read
How a revolutionary technology was usurped for evil, and what we can do about it Since its inception, email has gone from a novelty, to a necessity, to at...
Hiding in Plain Sight
1 min read
Talos has compiled a list of 74 groups on Facebook promising to carry out an array of cyber dirty deeds, and we are tracking their potential impact on Cisco customers.
You’ve Got (Compromised) Mail!
3 min read
There are two kinds of people in this world: those who have been affected by Business Email Compromise (BEC) scams and those who don’t know they have been hit with...
Cisco Threat Response with Email Security Integration: Harmonizing Your Security Products
4 min read
Those of us who have been in security for more than 20 years are very familiar with the assertion that security is a process. For me, security has always been...
Going with what works: The state of phishing
3 min read
Go phish! Cyber-attacks are big business. And the bad guys know that in any business, the more revenue you can generate with least investment means larger profits. It makes...
Phishing 101: Protection for Everyone
3 min read
For individuals, these simple steps can help protect you. They are not a complete solution, but they are helpful.
Gozi ISFB Remains Active in 2018, Leverages “Dark Cloud” Botnet For Distribution
1 min read
Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years. Banking trojans are a widely distributed type of...
Why cybersecurity in the workplace is everyone’s business
1 min read
“If Microsoft calls and asks you for your password…it’s not real, ” said Steve LeBlond, VP of Technology and CTO of Ochsner Health System, while speaking at our Digital Health Summit on October 3. “We [Information Technology] will never ask you to log us in.” Steve was talking about phishing attacks, one of the biggest […]