Let’s Destroy Democracy

By Talos Group Election security through an adversary’s eyes This post was authored by Matt Olney. Executive summary Over the past few years, Cisco Talos has increasingly been involved in election security research and support, most recently supporting the Security Service of Ukraine in their efforts to secure the two Ukrainian presidential elections in April. […]

Threat Roundup for July 12 to July 19

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 12 and July 19. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how […]

Is Network Security Complexity Holding You Back?

By Brian Remmel At its most fundamental level, the objective of network security is a simple one. Organizations need to protect their people, assets, and the data that travels across and resides within their networks. They do this by setting security policies that detail parameters like who or what is allowed to access which resources. […]

SWEED: Exposing years of Agent Tesla campaigns

By Talos Group By Edmund Brumaghin and other Cisco Talos researchers. Executive summary Cisco Talos recently identified a large number of ongoing malware distribution campaigns linked to a threat actor we’re calling “SWEED,” including such notable malware as Formbook, Lokibot and Agent Tesla. Based on our research, SWEED — which has been operating since at […]

Threat Roundup for July 5 to July 12

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 5 and July 12. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how […]

Machen Sie Ihre Mitarbeiter zur Firewall

Sensibilisieren Sie Ihre Mitarbeiter wirksam für IT-Risiken – mit den Online Security Awareness Trainings von G DATA. Phishing, Social Engineering, Brute-Force-Attacken: Viele Cyber-Angriffe nutzen ungeschulte Mitarbeiter als Schwachstelle aus. Hacker schicken unter falschem Vorwand Rechnungen, die Spionage Software auf den PC laden oder entschlüsseln in kürzester Zeit zu einfach gewählte Passwörter. Die Schulung im E-Learning-Format umfasst […]

Cisco Threat Response Plugin: Defeat Threats With Just a Few Clicks

By Ben Greenbaum One of the best tools in your SOC’s arsenal is something you might already have access to and didn’t even have to pay for. If you already deploy Cisco Umbrella, AMP for Endpoints, Firepower devices, next-generation intrusion prevention system (NGIPS), Email Security, or Threat Grid, then you can immediately access Cisco Threat […]