ransomware
Today’s critical threats: A Cisco Security threat report
For more than a decade, Cisco’s security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organizational implications. Today we are…
Nearly every threat is either on an endpoint, or it’s headed there
This is because the endpoint is, well, the end. That is where data resides; where individuals organize, communicate, and conduct nearly all activities of their lives; and is often considered the crown-jewel of your organization by the bad-guys. I’ve heard some people call the endpoint the new perime…
Cybersecurity: A spooky tech-tale for Halloween
In the world of government cybersecurity, ghosts and goblins often take a different form. An innocent looking email, a nondescript USB drive, or even a seemingly helpful bot. Each can serve as a harbinger of doom, delivering destructive malware that leaves your network in disarray. So as the ghosts…
The Ransomware Evolution: What is Happening in Europe?
The European situation as shown by the Cisco 2018 Security Capabilities Benchmark Study (SCBS), compiled through interviews given by 956 CISOs in 8 European countries, reveals that the average percentage of alerts that are investigated is 57% overall, compared to 72% in Russia and 53% in the USA. Th…
Ransomware: Are you ready?
Don’t let an attack sideline your business. Ransomware is a lot more than the buzzword du jour. Attacks like WannaCry and Nyetya affected thousands of organizations around the world and cost billions of dollars in damages. While data theft and other types of attacks are very destructive, ransomware…
Files Cannot Be Decrypted? Challenge Accepted. Talos Releases ThanatosDecryptor
This blog post was authored by Edmund Brumaghin, Earl Carter and Andrew Williams. Executive summary Cisco Talos has analyzed Thanatos, a ransomware variant that is being distributed via multiple malware campaigns that have been conducted over the past few months. As a result of our research, we have…
Secure your Endpoints Against Ransomware: Introducing Malicious Activity Protection
Dubbed by many as the “Year of Ransomware”, 2017 provided us with a very important and dangerous evolution to how these attacks make their way to your endpoints. The Cisco 2018 Annual Cybersecurity Report warns that “defenders should prepare to face new, self-propagating” attacks, like those we saw…
Gandcrab Ransomware Walks its Way onto Compromised Sites
This blog post authored by Nick Biasini with contributions from Nick Lister and Christopher Marczewski. Despite the recent decline in the prevalence of ransomware in the threat landscape, Cisco Talos has been monitoring the now widely distributed ransomware called Gandcrab. Gandcrab uses both tradit…
2018 Cybersecurity Report Spotlights Emerging Threats to OT Environments
Manufacturers saw many interesting developments in the realm of industrial security in 2017. There were tremendous shifts in how to guard against threats with ransomware like WannaCry, Nyetya, and now the Trisis/Triton/Hatman incident impacting organizations and making headlines across the globe. Sa…
2