Einträge von Technik Support

Introducing SecureX

By Jeff Reed Making Security an Enabler, so Your Business Can Take an Exponential Leap I joined the Cisco Security team the week after the RSA Conference in 2017. At that time there was a lot of discussion around the journey Cisco Security was on, particularly around our efforts to deliver an integrated architecture. For […]

Threat Roundup for February 14 to February 21

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Feb 14 and Feb 21. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how […]

ObliqueRAT: New RAT hits victims’ endpoints via malicious documents

By Talos Group By Asheer Malhotra. Cisco Talos has observed a malware campaign that utilizes malicious Microsoft Office documents (maldocs) to spread a remote access trojan (RAT) we’re calling “ObliqueRAT.” These maldocs use malicious macros to deliver the second stage RAT payload. This campaign appears to target organizations in Southeast Asia. Network based detection, although […]

4 Cybersecurity Trends that Will Make an Impact in 2020

By Jeff Reed My cybersecurity trends outlook for 2020 builds on my forecast for 2019. Identity and application security are still top-of-mind this year, but in new and more advanced ways. As we approach RSA 2020, these are four trends in cybersecurity that I expect will make an impact this year. 1. Zero Trust goes […]

The Voice of the CISO Customers – CISO Day in Europe

By Cindy Valladares As part of the activities surrounding Cisco Live Barcelona, we held a very special event specifically tailored for our CISO customers: Cisco CISO Day. It was a full day of exploring topics curated for this executive audience, and an opportunity for them to connect with peers in the security industry. We had […]

Building a bypass with MSBuild

By Talos Group By Vanja Svajcer. In one of our previous posts, we discussed the usage of default operating system functionality and other legitimate executables to execute the so-called “living-off-the-land” approach to the post-compromise phase of an attack. We called those binaries LoLBins. Since then, Cisco Talos has analyzed telemetry we received from Cisco products […]

Threat Roundup for February 7 to February 14

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Feb 7 and Feb 14. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how […]

Threat actors attempt to capitalize on coronavirus outbreak

By Talos Group By Nick Biasini and Edmund Brumaghin. Coronavirus is dominating the news and threat actors are taking advantage. Cisco Talos has found multiple malware families being distributed with Coronavirus lures and themes. This includes emotet and several RAT variants. Executive Summary Using the news to try and increase clicks and drive traffic is […]

Cisco and Telenor: Working Together to Protect Infrastructure

By Dan Kurschner For service providers around the world, security is a fundamental and integral part of what they do. With operations across Scandinavia and Asia, Telenor is no exception. The company connects 183 million customers, and each one of them expects secure connections. It’s a given. That’s a key reason Telenor Group and Cisco […]