Cisco Blogs
Voice Search is currently unavailable
Powered by Google Web Speech API
We didn't hear that. Try again.
When autocomplete results are available use up and down arrows to review and enter to select

threat intelligence

June 6, 2018

THREAT RESEARCH

VPNFilter Update – VPNFilter exploits endpoints, targets new devices

1 min read

Cisco Talos has discovered additional details regarding "VPNFilter," which is targeting more makes/models of devices than initially thought, and has additional capabilities to deliver exploits to endpoints.

May 23, 2018

THREAT RESEARCH

New VPNFilter malware targets at least 500K networking devices worldwide

2 min read

For several months, Talos has been working with public- and private-sector threat intelligence partners and law enforcement in researching an advanced, likely state-sponsored or state-affiliated actor's widespread use.

April 26, 2018

SECURITY

Perspectives on Cryptomining

1 min read

If you keep up with trends in security, you’ve likely heard about illicit cryptomining – software that hijacks system resources to generate cryptocurrencies. We’ve been busy updating our product portfolio...

February 26, 2018

THREAT RESEARCH

Who Wasn’t Responsible for Olympic Destroyer?

1 min read

This blog post is authored by Paul Rascagneres and Martin Lee. Summary Evidence linking the Olympic Destroyer malware to a specific threat actor group is contradictory, and does not allow...

January 26, 2018

SECURITY

Demystifying the API (Using Threat Grid as an Example)

3 min read

Let's talk about API usage. An API is a means of interacting with a program via another program. Just like a UI is a User Interface, an API is an...

January 23, 2018

DEVELOPER

Explore the Threat Intelligence Capabilities in the Threat Grid API

2 min read

Cisco Threat Grid offers a powerful combination of automated malware analysis and advanced threat intelligence. Threat Grid is the file analysis backend of all Cisco Advanced Threat Solutions (ATS) products, and is directly usable via a portal account in the cloud deployment or portal access to a local appliance version. What is less well known, […]

December 21, 2017

SECURITY

Defending Against The $5B Cybersecurity Threat – Business Email Compromise

3 min read

If an average employee at your company got an email from an executive with an urgent request, would they question whether the email was coming from the actual sender? They probably wouldn’t. The reality is that most people would act on the request because of its time-sensitive nature. They assume that the IT team has […]

November 27, 2017

SECURITY

#CiscoChat Podcast: Cisco and INTERPOL Join Forces to Fight Cybercrime

1 min read

On 21 November 2017, Cisco and INTERPOL announced an agreement to share threat intelligence and jointly fighting cybercrime. In this podcast, I talk about the significance of this global agreement.

August 28, 2017

SECURITY

What’s in a Name? Threat Intelligence, Artificial Intelligence, and Extreme Snack Foods

3 min read

What is in a name? A lot, actually. A rose by any other name would certainly smell just as sweet. But if I sold you a dozen dandelions, calling them roses, as the perfect Valentine’s Day gift for your sweetheart, neither of you would be none too pleased, would you? It makes me think of […]