Threat of the Month

February 14, 2019

SECURITY

Today’s critical threats: A Cisco Security threat report

For more than a decade, Cisco’s security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organizational implications. Today we are…

January 14, 2019

SECURITY

SMB and the return of the worm

Watch the threat landscape long enough, and you’ll see that some things are cyclical. Threat types and attack methods fall in and out of fashion. As the use of one vector declines, another increases in popularity. Take network shares for instance—the technology that allows users to share files and f…

December 11, 2018

SECURITY

Cryptomining: A sheep or a wolf?

One of, if not the, most prominent motivators for threat actors is money. Whether it’s botnet owners renting out their services for DDoS attacks, tech support scammers cold-calling people to convince them there are problems with their computers, or point-of-sale Trojan horses siphoning off credit ca…

November 1, 2018

SECURITY

Going with what works: The state of phishing

Go phish! Cyber-attacks are big business. And the bad guys know that in any business, the more revenue you can generate with least investment means larger profits. It makes sense that when the bad guys find a reliable attack vector, like email phishing, they’ll use it for as long as it makes financi…

September 13, 2018

SECURITY

In Pursuit of Invisibility: Fileless Malware

I recently heard a news story about a survey in which people were asked whether they would prefer the ability to fly or to be invisible. Sure, it was a silly question*, but it was interesting to hear why people made their choices. The majority chose flight. What really fascinated me was that the sur…