Advanced Malware Protection
Secure your Endpoints Against Ransomware: Introducing Malicious Activity Protection
Dubbed by many as the “Year of Ransomware”, 2017 provided us with a very important and dangerous evolution to how these attacks make their way to your endpoints. The Cisco 2018 Annual Cybersecurity Report warns that “defenders should prepare to face new, self-propagating” attacks, like those we saw…
IcedID Banking Trojan Teams up with Ursnif/Dreambot for Distribution
Update: 4/11 we have corrected the detection to Ursnif/Dreambot This post was authored by Ross Gibb with research contributions from Daphne Galme, and Michael Gorelik of Morphisec, a Cisco Security Technical Alliance partner. Cisco has noticed an increase in infections by the banking trojan IcedID t…
New #CiscoChat Podcast: Threat Correlation Across Endpoint, Network, & Cloud
In the realm of threat defense, hindsight is 20/20. That’s because, all too often, it’s difficult to get a clear view of your entire network’s security in real-time. And to accurately predict network threats? Forget about it. But not with Cisco Advanced Malware Protection (AMP). Giving you the visib…
For threat correlation across endpoint, network, and cloud – connect the dots
When I was a kid, I used to love dot-to-dot books. I enjoyed formulating a guess of what the picture was, the hunt in finding all the dots, the satisfaction of connecting them all together, and the excitement of the final picture coming into view to either confirm, or deny, my suspicions of what I w…
Who’s Afraid of Modernization?
Everybody knows that modernizing legacy systems brings better security along with all of the other improvements in power and efficiency. It seems, however, that despite what everybody knows, a large number of federal IT leaders don’t believe it. A recent survey showed that 59 percent of respondents…
Deep Dive into AMP and Threat Grid integration with Cisco Email Security
In our previous blog posts about AMP and Threat Grid on Cisco Email Security, we have discussed the approach to email security, that organizations could take to protect themselves against advanced threats. We have as well discussed the components of the solution and how they work together to protect…
Are You The Lucky One? Sometimes Luck Can Bring You Malware
For more than two decades, malicious actors have been evolving their Phishing techniques to effectively achieve their goals. From poorly crafted scams to extremely well crafted documents, Phishing attacks keep being a very effective technique in the attackers toolbox. Anyone can be a target. While m…
Malicious Spam Comes Roaring Back and Cisco Email Security is Ready
“Did you get my email? The really urgent one? About funding for your new project?” “Maybe. I can’t tell. My inbox is full of spam and I am busy scrutinizing every email and domain name to make sure the sender is a valid person that I actually know and the attachment is a valid… Oh wait, now my scree…
Under the hood: Why you need AMP on ESA
With 95 percent of breaches starting with a malicious email campaign, it’s more important than ever for organizations to be prepared and to be certain that their email security solution will truly protect their data, assets and users. In a recent blog post we discussed the need for advanced threat p…
1