threat intelligence
Perspectives on Cryptomining
1 min read
If you keep up with trends in security, you’ve likely heard about illicit cryptomining – software that hijacks system resources to generate cryptocurrencies. We’ve been busy updating our product portfolio...
Who Wasn’t Responsible for Olympic Destroyer?
1 min read
This blog post is authored by Paul Rascagneres and Martin Lee. Summary Evidence linking the Olympic Destroyer malware to a specific threat actor group is contradictory, and does not allow...
Demystifying the API (Using Threat Grid as an Example)
3 min read
Let's talk about API usage. An API is a means of interacting with a program via another program. Just like a UI is a User Interface, an API is an...
Explore the Threat Intelligence Capabilities in the Threat Grid API
2 min read
Cisco Threat Grid offers a powerful combination of automated malware analysis and advanced threat intelligence. Threat Grid is the file analysis backend of all Cisco Advanced Threat Solutions (ATS) products, and is directly usable via a portal account in the cloud deployment or portal access to a local appliance version. What is less well known, […]
Defending Against The $5B Cybersecurity Threat – Business Email Compromise
3 min read
If an average employee at your company got an email from an executive with an urgent request, would they question whether the email was coming from the actual sender? They probably wouldn’t. The reality is that most people would act on the request because of its time-sensitive nature. They assume that the IT team has […]
#CiscoChat Podcast: Cisco and INTERPOL Join Forces to Fight Cybercrime
1 min read
On 21 November 2017, Cisco and INTERPOL announced an agreement to share threat intelligence and jointly fighting cybercrime. In this podcast, I talk about the significance of this global agreement.
What’s in a Name? Threat Intelligence, Artificial Intelligence, and Extreme Snack Foods
3 min read
What is in a name? A lot, actually. A rose by any other name would certainly smell just as sweet. But if I sold you a dozen dandelions, calling them roses, as the perfect Valentine’s Day gift for your sweetheart, neither of you would be none too pleased, would you? It makes me think of […]
Open Source Threat Intel: GOSINT
2 min read
It’s our pleasure to announce the public availability of GOSINT – the open source intelligence gathering and processing framework. GOSINT allows a security analyst to collect and standardize structured and unstructured threat intelligence. Applying threat intelligence to security operations enriches alert data with additional confidence, context, and co-occurrence. This means that you are applying research […]
Ransomware: Past, Present, and Future
1 min read
The rise of ransomware over the past year is an ever growing problem. Business often believe that paying the ransom is the most cost effective way of getting their data back – and this may also be the reality. The problem we face is that every single business that pays to recover their files, is […]