ThreatGRID
Threat Round-up for Mar 24 – Mar 31
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between March 24 and March 31. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]
Threat Round-up for the Week of Mar 20 – Mar 24
1 min read
Talos is publishing a summary glimpse into the most prevalent threats observed over the past week.
Threat Roundup for the Week of Mar 6 – Mar 10
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed over the past week. As with our previous threat round-up, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]
AMP Threat Grid Integrated with Email Security
3 min read
We recently announced the release of AsyncOS 9.5 for Cisco Email Security that included the integration of AMP Threat Grid. Now if Threat Grid could talk it would sound a lot like Ron Burgundy and say “I’m not sure if you know this, but I’m kind of a big deal.” Email is consistently one of […]
AMP Threat Grid integrates with Tripwire Enterprise
3 min read
Today’s threat landscape is completely different than last year; and next years will be, not surprisingly, even worse. The Industrialization of Hacking has spawned a new era of professional, entrepreneurial, and resourceful cyber criminals. In recent year’s dynamic malware analysis (aka sandboxing) has become the shiny new technology that we all want, no, need to […]
Attackers Slipping Past Corporate Defenses with Macros and Cloud Hosting
6 min read
Macro malware is a good example of malware writers and distributors using old tricks that most users have forgotten to spread malware. Unlike earlier macro malware, these macros don’t infect other documents but download password stealing trojans and install them on targets. Macro malware typically arrives via email with an attachment that contains a macro-based phishing […]
Cisco Live!: Threat-Centric Security from Networks to Data Centers to Clouds
2 min read
Security has emerged as a leading pain point for CIOs, executives, and even in the boardroom due to changing business models and growing attack surfaces, a threat landscape that is more dynamic by the day and the increasing complexity of IT environments. With these challenges as a backdrop, attendees of our 25th annual Cisco Live! […]
Threading the Needle on Privacy and Malware Protection
2 min read
We have been clear that we have a distinct approach to Advanced Malware Protection (AMP), specifically the unique way in which we leverage the compute and storage capabilities of the public cloud. Doing so enables us to do a great number of things to help customers more effectively fight malware, particularly when compared to traditional, […]
Executing on our Vision: Cisco’s Comprehensive Advanced Malware Protection
3 min read
The increased scrutiny on security is being driven by the evolving trends of expanding networks, mobility, cloud computing and a threat landscape that is more dynamic than ever. A combination of these factors has led to an increase in attack access points and a re-definition of the traditional network perimeter. Due to these concerns, we […]