threat hunting

February 16, 2024

SECURITY

Agniane Stealer: Information stealer targeting cryptocurrency users

7 min read

Agniane Stealer is a malware that targets credentials and documents, actively sold on Telegram, with ConfuserEX obfuscations, presents novel C2 protocol.

August 1, 2023

SECURITY

From Risk to Resilience: Ransomware Recovery with Cisco XDR and Cohesity

2 min read

Discover how Cisco XDR enables SOC teams to detect, snapshot, and restore business-critical data at the very first sign of ransomware.

July 31, 2023

SECURITY

What’s in a Name? The XDR for 2023 and beyond

2 min read

Cisco announces General Availability of Cisco XDR on July 31, 2023, helping security analysts rapidly identify and remediate threats, optimizing SOC performance.

June 22, 2023

SECURITY

Mastering the Hunt: Five Ways XDR Enhances Threat Hunting Strategies

5 min read

Discover how combining threat hunting with XDR can enhance your organization's security posture and your ability to detect and respond to potential threats.

June 15, 2023

SECURITY

Security automation with Cisco XDR

4 min read

Trying to keep up with ever-changing threats? Cisco XDR can help accelerate your security operations with multiple types of powerful, built-in automation.

June 9, 2023

SECURITY

Moving the Security Poverty Line: Why We Need a Collaborative Approach to Cybersecurity

3 min read

Learn how a collective approach to security will help secure individual systems and strengthen security postures across the broader digital landscape.

March 9, 2023

SECURITY

People Matter: A look back on how Cisco Talos has been supporting Ukraine

2 min read

In this ThreatWise TV special documentary edition, we take a look at Talos’s efforts to protect Ukrainian critical infrastructure from cyber attacks.

April 22, 2021

SECURITY

Inside Cisco’s performance in the 2020 MITRE Engenuity ATT&CK® Evaluation

4 min read

Cisco Secure Endpoint has successfully completed the 2020 MITRE Engenuity ATT&CK® Evaluation. Read more to learn how we can effectively protect and detect threats before compromise.