Angler Catches Victims Using Phish as Bait

By Talos Group This post authored by Nick Biasini with contributions from Erick Galinkin. Exploit kits have been a recurring threat that we’ve discussed here on this blog as a method of driving users to maliciousness. Users typically encounter exploit kit landing pages through compromised websites and malvertising. However, we’ve found a new email twist to the standard […]

Source:: Cisco Security Notice

Threat Spotlight: Spin to Win…Malware

By Talos Group This post was authored by Nick Biasini with contributions from Tom Schoellhammer and Emmanuel Tacheau The threat landscape is ever changing and adversaries are always working to find more efficient ways to compromise users. One of the many ways that users are driven to malicious content is through malicious advertisements known as malvertising. Talos has […]

Source:: Cisco Security Notice

Threat Spotlight: Spin to Win…Malware

By Talos Group This post was authored by Nick Biasini with contributions from Tom Schoellhammer and Emmanuel Tacheau The threat landscape is ever changing and adversaries are always working to find more efficient ways to compromise users. One of the many ways that users are driven to malicious content is through malicious advertisements known as malvertising. Talos has […]

Source:: Cisco Security Notice

The Changing Face of the Healthcare Security Leader

By Richard Staynings If you worked with just about any hospital or healthcare provider a mere ten years ago you may have come across the Information Security Manager, Director of Security and Compliance, or someone who filled this role under another title. Their role was to lead ‘IT Security‘ and manage a small staff of security administrators or […]

Source:: Cisco Security Notice

The Changing Face of the Healthcare Security Leader

By Richard Staynings If you worked with just about any hospital or healthcare provider a mere ten years ago you may have come across the Information Security Manager, Director of Security and Compliance, or someone who filled this role under another title. Their role was to lead ‘IT Security‘ and manage a small staff of security administrators or […]

Source:: Cisco Security Notice

5 Steps to an Effective Data Incident Response Program

By Michelle Fleury All organizations depend, at least in part, on their data to carry out day-to-day operations. Yet new, high-profile data breaches are reported every week, and the costs of those breaches continue to rise The core elements of an incident response program are straightforward and quick to establish. Let’s take a look at the critical processes […]

Source:: Cisco Security Notice

5 Steps to an Effective Data Incident Response Program

By Michelle Fleury All organizations depend, at least in part, on their data to carry out day-to-day operations. Yet new, high-profile data breaches are reported every week, and the costs of those breaches continue to rise The core elements of an incident response program are straightforward and quick to establish. Let’s take a look at the critical processes […]

Source:: Cisco Security Notice

Cryptolocker 4 White Paper Available: The Evolution Continues

By Talos Group We are pleased to announce the availability of the cryptolocker 4 white paper. Over the past year, Talos has devoted a significant amount of time to better understanding how ransomware operates, its relation to other malware, and its economic impact. This research has proven valuable for Talos and led the development of better detection methods […]

Source:: Cisco Security Notice

Cryptolocker 4 White Paper Available: The Evolution Continues

By Talos Group We are pleased to announce the availability of the cryptolocker 4 white paper. Over the past year, Talos has devoted a significant amount of time to better understanding how ransomware operates, its relation to other malware, and its economic impact. This research has proven valuable for Talos and led the development of better detection methods […]

Source:: Cisco Security Notice

Research Spotlight: The Resurgence of Qbot

By Talos Group The post was authored by Ben Baker. Qbot, AKA Qakbot, has been around for since at least 2008, but it recently experienced a large surge in development and deployments. Qbot is being Qbot primarily targets sensitive information like banking credentials. Here we are unveiling recent changes to the malware that haven’t been made public yet. […]

Source:: Cisco Security Notice