Articles
Your money or your life: Digital extortion scams
There’s a particularly insidious type of targeted phishing scam that has grown in popularity since mid-2018. Our Cisco Talos researchers have been monitoring these scams, a few of which we’ll highlight here. As is the case with most phishing scams, they’re after your money, but it’s a departure from…
Today’s critical threats: A Cisco Security threat report
For more than a decade, Cisco’s security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organizational implications. Today we are…
SMB and the return of the worm
Watch the threat landscape long enough, and you’ll see that some things are cyclical. Threat types and attack methods fall in and out of fashion. As the use of one vector declines, another increases in popularity. Take network shares for instance—the technology that allows users to share files and f…
Cryptomining: A sheep or a wolf?
One of, if not the, most prominent motivators for threat actors is money. Whether it’s botnet owners renting out their services for DDoS attacks, tech support scammers cold-calling people to convince them there are problems with their computers, or point-of-sale Trojan horses siphoning off credit ca…
3