threat intelligence

October 13, 2015

THREAT RESEARCH

Project Aspis

One of the hardest jobs on the Internet is to work the abuse desk at a hosting provider.  These teams have to strike a difficult balance between protecting their customers, ensuring that their services aren’t being abused by malicious actors and delivering the service and convenience their customers…

July 31, 2015

SECURITY

Changing the Way We Deliver Vulnerability and Threat Intelligence

We are making some changes to the way Cisco Security provides and shares vulnerability and threat intelligence to make it more consumable by our customers and the security community. The Cisco Security IntelliShield Service has been successfully delivering multi-vendor security intelligence to our c…

June 24, 2015

THREAT RESEARCH

Hook, Line & Sinker: Catching Unsuspecting Users Off Guard

This post was authored by Earl Carter. Attackers are constantly looking for ways to monetize their malicious activity. In many instances this involves targeting user data and accounts. Talos continues to see phishing attacks targeting customers of multiple high profile financial institutions.  In th…

April 15, 2015

SECURITY

Three Key Considerations When Evaluating Threat Intelligence Solutions

To address today’s evolving threat landscape, there’s been a shift from traditional event-driven security to intelligence-led security. Threat intelligence plays an integral role in this shift. When you hear the term “Threat Intelligence,” it’s easy to have preconceived notions of what it means. Gar…

July 14, 2014

SECURITY

Big Data: Observing a Phishing Attack Over Years

Overview Phishing attacks use social engineering in an attempt to lure victims to fake websites. The websites could allow the attacker to retrieve sensitive or private information such as usernames, passwords, and credit card details. Attacks of this kind have been around since 1995, evolving in sop…

December 16, 2013

SECURITY

Our Unofficial Top Ten Cyber Trends for 2014

(I pulled this list together with the help of my colleague Martin Chorich. Or maybe it was the other way around. ) Every year, publications ranging from supermarket tabloids to serious academic journals issue forecasts for the coming year. Those with foresight hold on to these articles and read them…

April 18, 2013

SECURITY

Effective Global Threat Intelligence Doesn’t Just Happen

The concept of crowd sourcing cyber intelligence may sound like an unstructured process, but there’s more to it than that. First, you need to remember that all crowds consist of collections of individuals contributing to the community knowledge base. Second, someone has to take responsibility for ga…

April 12, 2013

SECURITY

Making Global Threat Intelligence Locally Actionable

When we talk about using the network to gather threat intelligence on a global basis, the question arises: how does someone apply that intelligence to protecting their local IT infrastructure? The key lies in maintaining a high degree of situational awareness. This begins with understanding what you…

February 27, 2013

SECURITY

Missing the Mark on Cloud-based Intelligence

This week, Juniper Networks announced a new cloud-based threat intelligence service focused on fingerprinting attackers’ individual devices. We’d like to officially welcome Juniper to the cloud-based security intelligence market—a space where Cisco has a proven track record of leadership through Sec…