ThreatGRID

March 31, 2017

THREAT RESEARCH

Threat Round-up for Mar 24 – Mar 31

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between March 24 and March 31. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

March 24, 2017

THREAT RESEARCH

Threat Round-up for the Week of Mar 20 – Mar 24

1 min read

Talos is publishing a summary glimpse into the most prevalent threats observed over the past week.

March 10, 2017

THREAT RESEARCH

Threat Roundup for the Week of Mar 6 – Mar 10

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed over the past week. As with our previous threat round-up, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

July 15, 2015

SECURITY

AMP Threat Grid Integrated with Email Security

3 min read

We recently announced the release of AsyncOS 9.5 for Cisco Email Security that included the integration of AMP Threat Grid. Now if Threat Grid could talk it would sound a lot like Ron Burgundy and say “I’m not sure if you know this, but I’m kind of a big deal.” Email is consistently one of […]

June 26, 2015

SECURITY

AMP Threat Grid integrates with Tripwire Enterprise

3 min read

Today’s threat landscape is completely different than last year; and next years will be, not surprisingly, even worse. The Industrialization of Hacking has spawned a new era of professional, entrepreneurial, and resourceful cyber criminals. In recent year’s dynamic malware analysis (aka sandboxing) has become the shiny new technology that we all want, no, need to […]

May 12, 2015

SECURITY

Attackers Slipping Past Corporate Defenses with Macros and Cloud Hosting

6 min read

Macro malware is a good example of malware writers and distributors using old tricks that most users have forgotten to spread malware. Unlike earlier macro malware, these macros don’t infect other documents but download password stealing trojans and install them on targets. Macro malware typically arrives via email with an attachment that contains a macro-based phishing […]

May 29, 2014

SECURITY

Cisco Live!: Threat-Centric Security from Networks to Data Centers to Clouds

2 min read

Security has emerged as a leading pain point for CIOs, executives, and even in the boardroom due to changing business models and growing attack surfaces, a threat landscape that is more dynamic by the day and the increasing complexity of IT environments. With these challenges as a backdrop, attendees of our 25th annual Cisco Live! […]

May 23, 2014

SECURITY

Threading the Needle on Privacy and Malware Protection

2 min read

We have been clear that we have a distinct approach to Advanced Malware Protection (AMP), specifically the unique way in which we leverage the compute and storage capabilities of the public cloud. Doing so enables us to do a great number of things to help customers more effectively fight malware, particularly when compared to traditional, […]

May 22, 2014

SECURITY

Executing on our Vision: Cisco’s Comprehensive Advanced Malware Protection

3 min read

The increased scrutiny on security is being driven by the evolving trends of expanding networks, mobility, cloud computing and a threat landscape that is more dynamic than ever. A combination of these factors has led to an increase in attack access points and a re-definition of the traditional network perimeter. Due to these concerns, we […]