cyber threats
A Look Back at the Major Cyber Threats of 2019
Today we launch our 2019 Threats of the Year report; a look back at the major tools and tactics that cybercriminals have exploited over the past year. Based on original research conducted for our ‘Threat of the Month’ blog series, we look into the impact of directed attacks against specific o…
Threat Hunting for the Riskiest 1 Percent
How to hunt for threats with speed and precision “What’s our exposure?” is a question that requires an urgent and conclusive answer as soon as a potential threat is discovered. That dreaded question can come as an urgent message on Sunday when you’re with your family, as a text at the crack o…
Summer reading list: modernizing IT and enhancing cybersecurity, plus a view of the bright side
When my children were younger, the first sign of summer—besides the longer days and warmer temperatures—was our annual trip to our local bookstore. We (me included!) always came home from these jaunts with arms full of books. A few were from their school’s ubiquitous “summer reading” list, but many…
[New Cybersecurity Report] How to Stay Ahead of the Latest Cyber Threats in Higher Ed
Twice each year, Cisco threat researchers and technology partners share data and analysis about cybercriminal activity that threatens networks around the globe. The goal of these cybersecurity reports is to arm you with information that can help you stop attackers or mitigate the impact of an attack…
Make a Security Resolution with a Trustworthy Network Infrastructure
In 2017, businesses lost hundreds of billions of dollars in revenue as a result of cyber attacks. You saw cyber threats all over the news with data breaches permeating the economy. The WannaCry ransomware attack affected hundreds of thousands of computers globally. The Equifax breach, considered one…
When combining exploits for added effect goes wrong
Since public disclosure in April 2017, CVE-2017-0199 has been frequently used within malicious Office documents. The vulnerability allows attackers to include Ole2Link objects within RTF documents to launch remote code when HTA applications are opened and parsed by Microsoft Word. In this recent cam…
WannaCry Type Ransomware a Growing Threat: 5 Easy Steps to Protect Your Agency
It all started harmlessly enough. A pleasant sounding ping on her phone and a quick check of her email. But it then quickly descended into a weekend of worry. For people in both the public and private sector, cyber attack has become a potentially life-altering and seemingly unstoppable threat that i…
Attackers Evolve Tactics to Infiltrate Your Network via Email
Email continues to be the number one business communication method and is still the number one threat vector. This ubiquitous communication technology also provides an effective path for criminal actors. Today, customers are more concerned about targeted and other advanced attacks rather than spam c…
Cisco Cloud Security Architecture: Un-Cloaking Invisible Threats
In the more than ten years, I have worked in developing security solutions, I have witnessed the steady evolution of security threats and the incredible strides made to combat them. Recent high profile security breaches have shown that a breach in security can have serious consequences.. It can lead…
3