threat hunting
Strengthen Your Security Operations: MITRE ATT&CK Mapping in Cisco XDR
2 min read
Discover how Cisco XDR's MITRE ATT&CK mapping strengthens your security operations. Learn to identify security gaps and improve your cybersecurity posture.
Agniane Stealer: Information stealer targeting cryptocurrency users
7 min read
Agniane Stealer is a malware that targets credentials and documents, actively sold on Telegram, with ConfuserEX obfuscations, presents novel C2 protocol.
From Risk to Resilience: Ransomware Recovery with Cisco XDR and Cohesity
2 min read
Discover how Cisco XDR enables SOC teams to detect, snapshot, and restore business-critical data at the very first sign of ransomware.
What’s in a Name? The XDR for 2023 and beyond
2 min read
Cisco announces General Availability of Cisco XDR on July 31, 2023, helping security analysts rapidly identify and remediate threats, optimizing SOC performance.
Mastering the Hunt: Five Ways XDR Enhances Threat Hunting Strategies
5 min read
Discover how combining threat hunting with XDR can enhance your organization's security posture and your ability to detect and respond to potential threats.
Security automation with Cisco XDR
4 min read
Trying to keep up with ever-changing threats? Cisco XDR can help accelerate your security operations with multiple types of powerful, built-in automation.
Moving the Security Poverty Line: Why We Need a Collaborative Approach to Cybersecurity
3 min read
Learn how a collective approach to security will help secure individual systems and strengthen security postures across the broader digital landscape.
Simplify Your Security Operations with Cisco XDR, Launching at RSAC
4 min read
Cisco XDR simplifies security operations, allowing security teams to elevate productivity and stay resilient against the most sophisticated threats.
People Matter: A look back on how Cisco Talos has been supporting Ukraine
2 min read
In this ThreatWise TV special documentary edition, we take a look at Talos’s efforts to protect Ukrainian critical infrastructure from cyber attacks.