Category: Security – Cisco Blogs

Maintaining Data Privacy in the Age of COVID

Read the original article: Maintaining Data Privacy in the Age of COVID The Cisco 2020 Consumer Privacy Survey finds that most consumers want privacy protections maintained despite the pandemic, and many have stopped buying from companies who don’t adequately protect…

Dynamic Data Resolver – Version 1.0.1 beta

Read the original article: Dynamic Data Resolver – Version 1.0.1 beta Cisco Talos is releasing a new beta version of Dynamic Data Resolver (DDR) today. This release comes with a new architecture for samples using multi-threading. The process and thread…

What Cybersecurity and Traveling Have in Common

Read the original article: What Cybersecurity and Traveling Have in Common Cybersecurity weaves itself through every aspect of our lives: the phone in your pocket, the smart TV in your home, and on and on. And the idea that each…

Threat Roundup for October 9 to October 16

Read the original article: Threat Roundup for October 9 to October 16 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between October 9 and October 16. As with previous roundups, this post isn’t meant to…

Lemon Duck brings cryptocurrency miners back into the spotlight

Read the original article: Lemon Duck brings cryptocurrency miners back into the spotlight Attackers are constantly reinventing ways of monetizing their tools. Cisco Talos recently discovered a complex campaign employing a multi-modular botnet with multiple ways to spread. This threat,…

Threat Landscape Trends: Endpoint Security, Part 2

Read the original article: Threat Landscape Trends: Endpoint Security, Part 2 In this blog series, Threat Landscape Trends, we’ll be taking a look at activity in the threat landscape and sharing the latest trends we see. By doing so, we…

Threat Roundup for October 2 to October 9

Read the original article: Threat Roundup for October 2 to October 9 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between September 25 and October 2. As with previous roundups, this post isn’t meant to…

90 days, 16 bugs, and an Azure Sphere Challenge

Read the original article: 90 days, 16 bugs, and an Azure Sphere Challenge Cisco Talos reports 16 vulnerabilities in Microsoft Azure Sphere’s sponsored research challenge. By Claudio Bozzato and Lilith [-_-]; and Dave McDaniel.   On May 15, 2020, Microsoft…

Is cybersecurity the right field for you?

Read the original article: Is cybersecurity the right field for you? Is cybersecurity the right field for you? If you are looking for a career with almost unlimited growth potential, cybersecurity might well be the ideal path for you. The…

Threat Roundup for September 25 to October 2

Read the original article: Threat Roundup for September 25 to October 2 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between September 25 and October 2. As with previous roundups, this post isn’t meant to…

LodaRAT Update: Alive and Well

Read the original article: LodaRAT Update: Alive and Well Talos recently identified new versions of Loda RAT, a remote access trojan written in AutoIt. Not only have these versions abandoned their usual obfuscation techniques, several functions have been rewritten and…

Microsoft Netlogon exploitation continues to rise

Read the original article: Microsoft Netlogon exploitation continues to rise Cisco Talos is tracking a spike in exploitation attempts against the Microsoft vulnerability CVE-2020-1472, an elevation of privilege bug in Netlogon, outlined in the August Microsoft Patch Tuesday report. The…

MITRE ATT&CK: The Magic of User Training

Read the original article: MITRE ATT&CK: The Magic of User Training How magical can user training be? You’ll be surprised at what Cisco and MITRE ATT&CK make possible. Shared responsibility is what really matters. The post MITRE ATT&CK: The Magic…

Threat Roundup for September 18 to September 25

Read the original article: Threat Roundup for September 18 to September 25 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between September 18 and September 25. As with previous roundups, this post isn’t meant to…

Automated response with Cisco Stealthwatch

Read the original article: Automated response with Cisco Stealthwatch Stealthwatch’s Response Manager has been moved to the web-based UI and modernized to offer new ways to share and respond to alarms with customizable rules and actions to automate remediation. The…

Why Are Applications Difficult to Secure?

Read the original article: Why Are Applications Difficult to Secure? You keep hearing that applications are difficult to secure – but why? Take a deep dive into the world of application development. The post Why Are Applications Difficult to Secure?…

Threat Landscape Trends: Endpoint Security, Part 1

Read the original article: Threat Landscape Trends: Endpoint Security, Part 1 In our new blog series, Threat Landscape Trends, we’ll be taking a look at activity in the threat landscape and sharing the latest trends we see. By doing so,…

Threat Landscape Trends: Endpoint Security

Read the original article: Threat Landscape Trends: Endpoint Security In our new blog series, Threat Landscape Trends, we’ll be taking a look at activity in the threat landscape and sharing the latest trends we see. By doing so, we hope…

Threat Roundup for September 11 to September 18

Read the original article: Threat Roundup for September 11 to September 18 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between September 11 and September 18. As with previous roundups, this post isn’t meant to…

MITRE ATT&CK: The Magic of Endpoint Protection

Read the original article: MITRE ATT&CK: The Magic of Endpoint Protection In our first blog, we introduced the Magic of Mitigations. They’re the key to getting started with MITRE ATT&CK. Now let’s look at some of the most magical ones,…

Cisco Secure Remote Worker Architecture for Azure

Read the original article: Cisco Secure Remote Worker Architecture for Azure Cisco Secure Remote Worker for Azure provides an a validated design for RAVPN. This Design includes Cisco AnyConnect, Duo, Umbrella and AMP. The post Cisco Secure Remote Worker Architecture…

Threat Roundup for September 4 to September 11

Read the original article: Threat Roundup for September 4 to September 11 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between September 4 and September 11. As with previous roundups, this post isn’t meant to…

Threat Roundup for August 28 to September 4

Read the original article: Threat Roundup for August 28 to September 4 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between August 28 and September 4. As with previous roundups, this post isn’t meant to…

Salfram: Robbing the place without removing your name tag

Read the original article: Salfram: Robbing the place without removing your name tag Over the past several months, Cisco Talos has seen attackers carrying out ongoing email-based malware distribution campaigns to distribute various malware payloads. These email campaigns feature several…

Threat protection: The WastedLocker ransomware

Read the original article: Threat protection: The WastedLocker ransomware What is WastedLocker and how do Cisco Security technologies stop it? In this blog, we walk through the infection process, alongside points where our technologies can detect and block the threat.…

Crafting a New Universe of Multi-Vendor Security Integrations

Read the original article: Crafting a New Universe of Multi-Vendor Security Integrations Cisco Security Technical Alliance (CSTA) facilitates open multivendor product integrations across our Security products. Our largest launch to-date; today we announce new technology partners joining CSTA and over…

Threat Roundup for August 21 to August 27

Read the original article: Threat Roundup for August 21 to August 27 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between August 21 and August 27. As with previous roundups, this post isn’t meant to…

Enterprise agreement + built-in platform = simpler security

Read the original article: Enterprise agreement + built-in platform = simpler security While other portfolio vendors have enterprise agreements or security platforms, what each offers pale in comparison to Cisco. Let’s highlight three huge differentiators that enable the Cisco Secure…

How SMBs Are Reacting to a New Way of Working

Read the original article: How SMBs Are Reacting to a New Way of Working How are SMBs reacting to these new work-related challenges to ensure security and business continuity? To find out, we at Cisco asked security executives, thought leaders,…

Threat Roundup for August 14 to August 21

Read the original article: Threat Roundup for August 14 to August 21 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between August 14 and August 21. As with previous roundups, this post isn’t meant to…

MITRE ATT&CK: The Magic of Mitigations

Read the original article: MITRE ATT&CK: The Magic of Mitigations When learning new things, sometimes we need to slow down and take it all in. For me, understanding MITRE ATT&CK was like that. Sure, the notion of thinking like an…

Vote of Confidence: Securing the 2020 Election

Read the original article: Vote of Confidence: Securing the 2020 Election Trust in election results begins with faith in our election systems   Snail mail in the spotlight  Absentee ballots, also called voting by mail, is a hot topic. The pandemic is forcing everyone to re-think what…

Threat Roundup for August 7 to August 14

Read the original article: Threat Roundup for August 7 to August 14 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between August 7 and August 14. As with previous roundups, this post isn’t meant to…

Securing Remote Work: Questions You Should Ask

Read the original article: Securing Remote Work: Questions You Should Ask If you want to simplify the way you’re securing your remote work environment consider having integrated security solutions from one source versus various disconnected tools from multiple vendors. Cisco…

Attribution: A Puzzle

Read the original article: Attribution: A Puzzle By Martin Lee, Paul Rascagneres and Vitor Ventura. Introduction The attribution of cyber attacks is hard. It requires collecting diverse intelligence, analyzing it and deciding who is responsible. Rarely does the evidence available…

Is your internet service provider protecting you online?

Read the original article: Is your internet service provider protecting you online? Ever stopped to think about who is handling our connectivity to the internet and just how secure this is? Find out more about how service provider security infrastructure…

Adapting to a New Way of Working in 2020

Read the original article: Adapting to a New Way of Working in 2020 There has been a surge in remote working these past few months. Here are some recommendations from security thought leaders on how teams and organizations can make…

SecureX threat response ecosystem

Read the original article: SecureX threat response ecosystem With SecureX, you can accelerate threat hunting and incident response by seamlessly integrating SecureX threat response and your existing security technologies. You have the flexibility to bring your tools together, whether it’s…

Threat Roundup for July 31 to August 7

Read the original article: Threat Roundup for July 31 to August 7 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 31 and August 7. As with previous roundups, this post isn’t meant to…

What is application-first security?

Read the original article: What is application-first security? Securing applications is the #1 area to invest for your future. Your applications run your digital business. It is protecting the world’s economy. It is securing our family businesses, schools, corporations, our…

Combatting Cybersecurity Risks with Cisco Networking Academy

Read the original article: Combatting Cybersecurity Risks with Cisco Networking Academy How do you face increasing cyberattacks, while closing the widening #cybersecurity skills gap? The answer is simple: education though Networking Academy. The post Combatting Cybersecurity Risks with Cisco Networking…

Threat Roundup for July 24 to July 31

Read the original article: Threat Roundup for July 24 to July 31 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 24 and July 31. As with previous roundups, this post isn’t meant to…

“Don’t fire the CISO”, with Quentyn Taylor

Read the original article: “Don’t fire the CISO”, with Quentyn Taylor Our guest on the Security Stories podcast is Quentyn Taylor, CISO for Canon Europe. He shares his journey, as well as Canon’s customer centric security approach, coping with the…

SMB Cybersecurity: More products, more problems?

Read the original article: SMB Cybersecurity: More products, more problems? Cisco Product Marketing Manager Hazel Burton, Cisco Advisory CISO Wolf Goerlich, and Elevate Security Co-founder Masha Sedova conclude their SMB security discussion by examining the benefits of a simplified approach.…

Cisco SecureX – What’s driving our platform?

Read the original article: Cisco SecureX – What’s driving our platform? Along with the launch of Cisco SecureX came several new capabilities that help future-proof our platform. Learn about the latest innovations powering our integrated security approach. The post Cisco…

Adversarial use of current events as lures

Read the original article: Adversarial use of current events as lures By Nick Biasini. The goal of malicious activity is to compromise the system to install some unauthorized software. Increasingly that goal is tied to one thing: the user. Over…

Cisco SecureX and the Power of Teamwork

Read the original article: Cisco SecureX and the Power of Teamwork The need to connect people in new ways and foster collaboration has become more crucial now than ever. In that spirit, we recently launched our new security platform, Cisco…

Threat Roundup for July 17 to July 24

Read the original article: Threat Roundup for July 17 to July 24 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 17 and July 24. As with previous roundups, this post isn’t meant to…

CISOs share their stories

Read the original article: CISOs share their stories Our Security Stories podcast has captured some fascinating insights from CISOs. In this blog, our host Hazel recalls some of the leadership stories that have left their mark on her the most…

Cisco Secure Cloud Architecture for Azure

Read the original article: Cisco Secure Cloud Architecture for Azure Cisco Secure Cloud Architecture for Azure defines security controls to protect workloads & applications deployed in Azure. It combines Azure security controls with Cisco Security controls to provide unmatched security.…

Prometei botnet and its quest for Monero

Read the original article: Prometei botnet and its quest for Monero Attackers are constantly reinventing ways of monetizing their tools. Cisco Talos recently discovered a complex campaign employing a multi-modular botnet with multiple ways to spread and a payload focused…

Threat Roundup for July 10 to July 17

Read the original article: Threat Roundup for July 10 to July 17 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 3 and July 10. As with previous roundups, this post isn’t meant to…

Unleashing SecureX on copy paste compromise

Read the original article: Unleashing SecureX on copy paste compromise With the recent announcement and general availability of SecureX, and all the good things it can do around security visibility, automation and orchestration, I figured what better than put it…

The Tactical Chameleon: Security Through Diverse Strategy

Read the original article: The Tactical Chameleon: Security Through Diverse Strategy In order to effectively combat an increasingly strategic and varied set of threats, security professionals need to take a page from Musashi Miyamoto and fighting game players. The post…

Creating more opportunities for others in cybersecurity

Read the original article: Creating more opportunities for others in cybersecurity We have some important discussions in our latest Security Stories podcast. Andy Ellis joins us to talk about representation and diversity in the cybersecurity industry, and Noureen Njoroge speaks…

Securing Remote Work: Protecting Endpoints the Right Way

Read the original article: Securing Remote Work: Protecting Endpoints the Right Way Protecting the remote work environment is critical. Cisco’s Endpoint Security solution defends your remote workforce by blocking attacks at the endpoint before compromise, while helping you respond to…

ISE: Leadership Beyond Awards and Medals

Read the original article: ISE: Leadership Beyond Awards and Medals ISE awarded by Frost & Sullivan the 2020 Global Market Leadership Award. And we take a look at what it means to lead, ISE: Leadership Beyond Awards and Medals. The…

Threat Roundup for July 3 to July 10

Read the original article: Threat Roundup for July 3 to July 10 Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 3 and July 10. As with previous roundups, this post isn’t meant to…

Building a Culture of Security at Brunel University

Read the original article: Building a Culture of Security at Brunel University How do you build a culture of security in education? Learn how Brunel University made security a core part of their foundation in this week’s #EducationNow. The post…

The Hunt for the Most Dangerous Cyber Criminals

Read the original article: The Hunt for the Most Dangerous Cyber Criminals Learn more about the story behind the hunt for the most dangerous hackers, with investigative journalist Andy Greenberg and the Cisco Talos threat investigation team. The post The…

WastedLocker Goes “Big-Game Hunting” in 2020

Read the original article: WastedLocker Goes “Big-Game Hunting” in 2020 By Ben Baker, Edmund Brumaghin, JJ Cummings and Arnaud Zobec. Threat summary After initially compromising corporate networks, the attacker behind WastedLocker performs privilege escalation and lateral movement prior to activating…