H1N1: Technical analysis reveals new capabilities

By Josh Reynolds This blog is the first in a 3 part series that will provide an in-depth technical analysis on the H1N1 malware. I’ll be looking at how H1N1 has evolved, its obfuscation, analyzing its execution including new information stealing and user account control bypass capabilities, and finally exploring how we are both using and influencing security tools […]

Source:: Cisco Security Notice

Why Cisco Is an Essential Partner in Cyber Ops: PART 1

By Tom Gilheany A soccer ball without a player is useless. A violin without its musician is just a bit of wood and wire. And a beautiful new security deployment, no matter how advanced, needs skilled people to configure and operate it properly. That deployment must be operating at maximum effectiveness. It also must be tuned to the […]

Source:: Cisco Security Notice

Why Cisco Is an Essential Partner in Cyber Ops: PART 1

By Tom Gilheany A soccer ball without a player is useless. A violin without its musician is just a bit of wood and wire. And a beautiful new security deployment, no matter how advanced, needs skilled people to configure and operate it properly. That deployment must be operating at maximum effectiveness. It also must be tuned to the […]

Source:: Cisco Security Notice

Ransomware: The race you don’t want to lose

By Shelly Giesbrecht In the race to detect and contain ransomware on their networks, many organizations fail before they are out of the gate. The reason has very little to do with technology, and more so a great deal to do with process. “But we bought all the good tools!”, such organizations protest. Good security technologies implemented and […]

Source:: Cisco Security Notice

Ransomware: The race you don’t want to lose

By Shelly Giesbrecht In the race to detect and contain ransomware on their networks, many organizations fail before they are out of the gate. The reason has very little to do with technology, and more so a great deal to do with process. “But we bought all the good tools!”, such organizations protest. Good security technologies implemented and […]

Source:: Cisco Security Notice

Talos ShadowGate Take Down: Global Malvertising Campaign Thwarted

By Talos Group This blog authored by Nick Biasini. Exploit kits are a class of threat that indiscriminately aims to compromise all users. Talos has continued to monitor this threat over time resulting in large scale research and even resulting in a large scale takedown. The focus of this investigation is on the tools and techniques being used […]

Source:: Cisco Security Notice

Talos ShadowGate Take Down: Global Malvertising Campaign Thwarted

By Talos Group Yet another example of how organizations work together to stop threats affecting users around the globe.

Source:: Cisco Security Notice

Talos ShadowGate Take Down: Global Malvertising Campaign Thwarted

By Talos Group This blog authored by Nick Biasini. Exploit kits are a class of threat that indiscriminately aims to compromise all users. Talos has continued to monitor this threat over time resulting in large scale research and even resulting in a large scale takedown. The focus of this investigation is on the tools and techniques being used […]

Source:: Cisco Security Notice

Talos ShadowGate Take Down: Global Malvertising Campaign Thwarted

By Talos Group Yet another example of how organizations work together to stop threats affecting users around the globe.

Source:: Cisco Security Notice

Securing Air Traffic Control Systems

By Jon Stanford I fly quite a bit for my job as a Security Services consultant for Cisco. I’m one of billions of passengers traveling annually: according to the International Air Transport Association (IATA), passenger numbers are expected to reach 3.8 billion in 2016. The number of unique city pairs connected by airline networks will reach 18,243. With […]

Source:: Cisco Security Notice