phishing

March 3, 2020

SECURITY

Security’s Vicious Cycle

Security Reimagined — Solving an Old Problem with a New Approach A decade ago this January, Steve Jobs challenged the conventional wisdom about tablets, unveiling the iPad with the words, “What this device has done is extraordinary.” Coming on the heels of iPhone’s smashing success three years earli…

January 15, 2020

SECURITY

Disk Image Deception

Cisco’s Computer Security Incident Response Team (CSIRT) detected a large and ongoing malspam campaign leveraging the .IMG file extension to bypass automated malware analysis tools and infect machines with a variety of Remote Access Trojans. During our investigation, we observed multiple tacti…

December 12, 2019

SECURITY

A Look Back at the Major Cyber Threats of 2019

Today we launch our 2019 Threats of the Year report; a look back at the major tools and tactics that cybercriminals have exploited over the past year. Based on original research conducted for our ‘Threat of the Month’ blog series, we look into the impact of directed attacks against specific o…

June 7, 2019

SECURITY

The Endless Scourge of Malicious Email

There is no question that unwanted email is a source of annoyance. It is also the biggest source of cyber threats. In fact, just last month, spam accounted for 85 percent of all email sent. Plus, according to Verizon’s 2018 Data Breach Investigations Report, email is the number one vector for both m…

May 29, 2019

SECURITY

Office 365 phishing

Let’s be honest: administering email is a pain. Routing issues, disk quotas, bouncebacks, the times when users can send but not receive emails, receive but not send, or they flat out cannot send or receive—the list goes on. It’s no wonder that email-hosting services like Office 365 have become so po…

May 20, 2019

THREAT RESEARCH

Recent MuddyWater-associated BlackWater campaign shows signs of new anti-detection techniques

This blog was authored by Danny Adamitis, David Maynor, and Kendall McKay Executive summary Cisco Talos assesses with moderate confidence that a campaign we recently discovered called “BlackWater” is associated with suspected persistent threat actor MuddyWater. Newly associated samples…

May 1, 2019

SECURITY

“Spark Joy” With New 12.0 Email Security Features & Videos

When you see “software update available,” does it spark joy? For many of us, the answer is a resounding “no.” But, don’t be fooled into thinking that our new 12.0 release of Cisco Email Security is anything other than extraordinary. Here are three reasons why: Our SVP of Product Management, Jeff Re…

April 18, 2019

SECURITY

Email – From Novelty to Nefarious

How a revolutionary technology was usurped for evil, and what we can do about it Since its inception, email has gone from a novelty, to a necessity, to at times a nuisance, and now, to downright nefarious. “You’ve got mail” has somehow turned into “You’ve got malware.” Email has become and remains…

April 5, 2019

THREAT RESEARCH

Hiding in Plain Sight

This blog was written by Jon Munshaw and Jaeson Schultz. Cisco Talos is continually working to ensure that our threat intelligence not only accounts for the latest threats but also new versions of old threats, such as spam. This often means pursuing cybercriminals wherever they congregate. However,…