hacking
Hiding in Plain Sight
This blog was written by Jon Munshaw and Jaeson Schultz. Cisco Talos is continually working to ensure that our threat intelligence not only accounts for the latest threats but also new versions of old threats, such as spam. This often means pursuing cybercriminals wherever they congregate. However,…
Cybersecurity: A spooky tech-tale for Halloween
In the world of government cybersecurity, ghosts and goblins often take a different form. An innocent looking email, a nondescript USB drive, or even a seemingly helpful bot. Each can serve as a harbinger of doom, delivering destructive malware that leaves your network in disarray. So as the ghosts…
What Have We Done With Our Personal Data?
Have you deleted your Facebook account in the wake of the Cambridge Analytica news? I’m not saying you should—really, I’m not—I’m just wondering. Because if you’ve tried, you may have figured out that it’s not that easy. You can’t just zap the app from your phone and call it a day. No—you’ve then go…
Top 3 Future Cyber Threats For State and Local Governments
Law Enforcement evidence held for ransom, utilities taken offline and transportation derailed. All have happened in the last 12 months. Sometimes it feels like TV supervillains from our childhood have come to life; CHAOS, Cobra and, worst of all, the dreaded Legion of Doom. But in a world of interna…
Three New Security Realities That Every CSO Should Face
Anyone responsible for keeping their Enterprise information secure has to understand three events that have changed the nature of Cyber-Security forever: 1. The Perimeter has Disappeared There used to be a strong perimeter defined by the network endpoints, which were all inside secured corporate bui…
AMP Threat Grid Empowers Law Enforcement to Fight Cybercrime
Recognizing the critical need for state and local law enforcement agencies to have state-of-the art technologies to effectively fight digital crime, Cisco is creating the AMP Threat Grid for Law Enforcement Program. The program is designed to empower those working to protect our communities from cyb…
John Chambers: “What does the Internet of Everything Mean for Security?”
Last week, Cisco CEO John Chambers attended the World Economic Forum in Davos, Switzerland. A major theme of the week was security and the implications of the Internet of Everything…the topic which John focused on in his contributed article to the WEF blog, Agenda. You can read the full articl…
Threat Spotlight: “Kyle and Stan” Malvertising Network 9 Times Larger Than Expected
This post was authored by Armin Pelkmann. On September 8th, Cisco’s Talos Security Intelligence & Research Group unveiled the existence of the “Kyle and Stan” Malvertisement Network. The network was responsible for placing malicious advertisements on big websites like amazon.co…
Threat Spotlight: “Kyle and Stan” Malvertising Network Threatens Windows and Mac Users With Mutating Malware
This post was authored by Shaun Hurley, David McDaniel and Armin Pelkmann. Update 2014-09-22: Updates on this threat can be found here Have you visited amazon.com, ads.yahoo.com, www.winrar.com, youtube.com, or any of the 74 domains listed below lately? If the answer is yes, then you may have been a…