Threat Hunting for the Holidays

By Gedeon Hombrebueno How to stop the ‘Grinch‘ from breaking your endpoint defenses You’re gearing up for the holidays. But then your phone rings – it’s your manager. He just heard

Source:: Cisco Security Notice

Black Hat Europe 2018

By Jessica Bair Black Hat Europe 2018 activity in the NOC was exciting from the first day and it never let up through the week.

Source:: Cisco Security Notice

Threat Roundup for Dec. 7 to Dec. 14

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Dec. 7 and Dec. 14. As with previous roundups, this post isn’t meant to be an

Source:: Cisco Security Notice

Bitcoin Bomb Scare Associated with Sextortion Scammers

By Talos Group This blog was written by Jaeson Schultz. Organizations across the country are on edge today after a flurry of phony bomb threats hit several public entities Thursday, such as universities,

Source:: Cisco Security Notice

How Stealthwatch Cloud protects against the most critical Kubernetes vulnerability to-date, CVE-2018-1002105

By Jeff Moncrief The increasing popularity of traditional cloud computing technologies such as server-less, on-demand compute and containerized environments has made technologies like Kubernetes part of our daily vernacular as it relates to

Source:: Cisco Security Notice

You’ve Got (Compromised) Mail!

By Ben Munroe There are two kinds of people in this world: those who have been affected by Business Email Compromise (BEC) scams and those who don’t know they have been hit with

Source:: Cisco Security Notice

Nearly every threat is either on an endpoint, or it’s headed there

By Aaron Woland This is because the endpoint is, well, the end. That is where data resides; where individuals organize, communicate, and conduct nearly all activities of their lives; and is often considered

Source:: Cisco Security Notice

Cryptomining: A sheep or a wolf?

By Marc Blackmer One of, if not the, most prominent motivators for threat actors is money. Whether it’s botnet owners renting out their services for DDoS attacks, tech support scammers cold-calling people to

Source:: Cisco Security Notice

Know Your Boundaries To Know your Strategy

By Robert Albach Where are the boundaries for threats to your operational systems? Has your organization initiated a risk assessment and created a threat model that would have covered some of the following

Source:: Cisco Security Notice

in(Secure) messaging apps — How side-channel attacks can compromise privacy in WhatsApp, Telegram, and Signal

By Talos Group Messaging applications have been around since the inception of the internet. But recently, due to the increased awareness around mass surveillance in some countries, more users are installing end-to-end encrypted

Source:: Cisco Security Notice