Einträge von Technik Support

Your Files Are Encrypted with a “Windows 10 Upgrade”

By Talos Group This post was authored by Nick Biasini with contributions from Craig Williams & Alex Chiu Adversaries are always trying to take advantage of current events to lure users into executing their malicious payload. These campaigns are usually focussed around social events and are seen on a constant basis. Today, Talos discovered a […]

Your Files Are Encrypted with a “Windows 10 Upgrade”

By Talos Group This post was authored by Nick Biasini with contributions from Craig Williams & Alex Chiu Adversaries are always trying to take advantage of current events to lure users into executing their malicious payload. These campaigns are usually focussed around social events and are seen on a constant basis. Today, Talos discovered a […]

Changing the Way We Deliver Vulnerability and Threat Intelligence

By Jeff Shipley We are making some changes to the way Cisco Security provides and shares vulnerability and threat intelligence to make it more consumable by our customers and the security community. The Cisco Security IntelliShield Service has been successfully delivering multi-vendor security intelligence to our customers for 15 years. During this time, the security […]

Changing the Way We Deliver Vulnerability and Threat Intelligence

By Jeff Shipley We are making some changes to the way Cisco Security provides and shares vulnerability and threat intelligence to make it more consumable by our customers and the security community. The Cisco Security IntelliShield Service has been successfully delivering multi-vendor security intelligence to our customers for 15 years. During this time, the security […]

Midyear Security Report: Exploit Kits and Ransomware Get Creative to Fool Users and Evade Detection

By Craig Williams The modern online adversary is out to make money, not simply hack networks for the fun of it. In the Cisco 2015 Midyear Security Report , there’s yet more evidence that criminals are using tools with ever-increasing sophistication to steal valuable personal or financial data and sell it, coerce users into paying […]