email security

June 1, 2017

SECURITY

Under the hood: Why you need AMP on ESA

With 95 percent of breaches starting with a malicious email campaign, it’s more important than ever for organizations to be prepared and to be certain that their email security solution will truly protect their data, assets and users. In a recent blog post we discussed the need for advanced threat p…

May 26, 2017

SECURITY

How to protect against the most advanced email-based attacks

With over 100 billion corporate emails exchanged each day, it’s no wonder that email remains a major threat vector. Organizations around the globe depend on email to quickly communicate and collaborate. And as long as organizations use email to send and receive files, communicate and interact, malic…

May 23, 2017

THREAT RESEARCH

Modified Zyklon and plugins from India

Streams of malicious emails Talos inspects every day usually consist of active spamming campaigns for various ransomware families, phishing campaigns and the common malware family suspects such as banking Trojans and bots.. It is however often more interesting to analyze campaigns smaller in volume…

March 3, 2017

THREAT RESEARCH

Malware Round-up For The Week of Feb 27 – Mar 3

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed over the past week. Unlike our other posts, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristic…

October 18, 2016

SECURITY

Combating Email Spoofing with Cisco Email Security Forged Email Detection

In April we covered the description of Email Spoofing using Microsoft Outlook, but what about detecting and mitigating it on the Mail Transfer Agent (MTA)? There are multiple technologies that have attempted to address the issues surrounding spoofed emails on the MTA, but they all have shortcomings…

October 6, 2016

SECURITY

Phishing for Threat Intelligence: Using Your Spam Quarantine for the Greater Good

Effectively protecting your assets increasingly involves effective threat intelligence to better understand the types of attackers targeting your sector, and what your vulnerabilities are. Lack of any threat intelligence at all, or even the foresight to use Google and Twitter to spot fake scams tren…

August 1, 2016

SECURITY

Attackers Evolve Tactics to Infiltrate Your Network via Email

Email continues to be the number one business communication method and is still the number one threat vector. This ubiquitous communication technology also provides an effective path for criminal actors. Today, customers are more concerned about targeted and other advanced attacks rather than spam c…

June 21, 2016

SECURITY

Protect against today’s attacks with AsyncOS 10.0 for Cisco Email Security

New email security release adds spoofing protection, auto-remediation of malware for Office 365 customers, AMP Private Cloud, and more. There’s been a spike in ransomware and spear-phishing attacks in the last several months. Read any news outlet and you’ll find examples of health records and other…

April 5, 2016

SECURITY

What is Email Spoofing and How to Detect It

What is Email Spoofing? Email spoofing is the creation of email messages with a forged sender address for the purpose of fooling the recipient into providing money or sensitive information.  For example: a sender 401k_Services@yourcompany.com sends a message to your business email address stating th…