threat intelligence
Remote work and the threat landscape
4 min read
This month, we decided to take a look at some of the trends we’ve seen in a shifting threat landscape, including attackers who are adapting their techniques to take advantage of new opportunities. When you understand what they’re doing, it’s easier to mount a better defense against new trends in the threat landscape.
A Look Back at the Major Cyber Threats of 2019
4 min read
Use the latest Cisco cybersecurity report to understand the current cyber threat landscape, and test how your organization would perform against these attacks.
Cisco Security & Trust at Cisco Live US
1 min read
At Cisco, cybersecurity is our top priority; from product development, to operations, to data protection and privacy, we are embedding security everywhere.
“Spark Joy” With New 12.0 Email Security Features & Videos
2 min read
When you see “software update available,” does it spark joy? For many of us, the answer is a resounding “no.” But, don’t be fooled into thinking that our new 12.0...
Your money or your life: Digital extortion scams
5 min read
An insidious targeted phishing scam is growing in popularity: scammers leveraging threats against your reputation, your relationships, or even your life. Witness the transition from carrot to stick.
Top of Mind for RSA Conference 2019
1 min read
With so many ways to experience RSAC and 5 days to take it in, you may be wondering what is top of mind so that you won’t miss a beat.
SMB and the return of the worm
5 min read
Watch the threat landscape long enough, and you’ll see that some things are cyclical. Threat types and attack methods fall in and out of fashion. As the use of one...
Cryptomining: A sheep or a wolf?
7 min read
One of, if not the, most prominent motivators for threat actors is money. Whether it’s botnet owners renting out their services for DDoS attacks, tech support scammers cold-calling people to...
VPNFilter Update – VPNFilter exploits endpoints, targets new devices
1 min read
Cisco Talos has discovered additional details regarding "VPNFilter," which is targeting more makes/models of devices than initially thought, and has additional capabilities to deliver exploits to endpoints.