cyber threats

December 12, 2019

SECURITY

A Look Back at the Major Cyber Threats of 2019

Today we launch our 2019 Threats of the Year report; a look back at the major tools and tactics that cybercriminals have exploited over the past year. Based on original research conducted for our ‘Threat of the Month’ blog series, we look into the impact of directed attacks against specific o…

March 8, 2019

SECURITY

Threat Hunting for the Riskiest 1 Percent

How to hunt for threats with speed and precision “What’s our exposure?” is a question that requires an urgent and conclusive answer as soon as a potential threat is discovered. That dreaded question can come as an urgent message on Sunday when you’re with your family, as a text at the crack o…

May 31, 2018

EDUCATION

Summer reading list: modernizing IT and enhancing cybersecurity, plus a view of the bright side

When my children were younger, the first sign of summer—besides the longer days and warmer temperatures—was our annual trip to our local bookstore. We (me included!) always came home from these jaunts with arms full of books. A few were from their school’s ubiquitous “summer reading” list, but many…

May 9, 2018

EDUCATION

[New Cybersecurity Report] How to Stay Ahead of the Latest Cyber Threats in Higher Ed

Twice each year, Cisco threat researchers and technology partners share data and analysis about cybercriminal activity that threatens networks around the globe. The goal of these cybersecurity reports is to arm you with information that can help you stop attackers or mitigate the impact of an attack…

January 24, 2018

NETWORKING

Make a Security Resolution with a Trustworthy Network Infrastructure

In 2017, businesses lost hundreds of billions of dollars in revenue as a result of cyber attacks. You saw cyber threats all over the news with data breaches permeating the economy. The WannaCry ransomware attack affected hundreds of thousands of computers globally. The Equifax breach, considered one…

August 14, 2017

THREAT RESEARCH

When combining exploits for added effect goes wrong

Since public disclosure in April 2017, CVE-2017-0199 has been frequently used within malicious Office documents. The vulnerability allows attackers to include Ole2Link objects within RTF documents to launch remote code when HTA applications are opened and parsed by Microsoft Word. In this recent cam…

May 16, 2017

GOVERNMENT

WannaCry Type Ransomware a Growing Threat: 5 Easy Steps to Protect Your Agency

It all started harmlessly enough. A pleasant sounding ping on her phone and a quick check of her email. But it then quickly descended into a weekend of worry. For people in both the public and private sector, cyber attack has become a potentially life-altering and seemingly unstoppable threat that i…

August 1, 2016

SECURITY

Attackers Evolve Tactics to Infiltrate Your Network via Email

Email continues to be the number one business communication method and is still the number one threat vector. This ubiquitous communication technology also provides an effective path for criminal actors. Today, customers are more concerned about targeted and other advanced attacks rather than spam c…

January 27, 2015

SP360: SERVICE PROVIDER

Cisco Cloud Security Architecture: Un-Cloaking Invisible Threats

In the more than ten years, I have worked in developing security solutions, I have witnessed the steady evolution of security threats and the incredible strides made to combat them. Recent high profile security breaches have shown that a breach in security can have serious consequences.. It can lead…