Cisco Blogs / Security / Threat Research / FireEye Breach Detection Guidance Cyber security firm FireEye recently disclosed an incident that was reported to have resulted in the inadvertent disclosure of various internally developed offensive security tools (OSTs) that were used across FireEye red-team engagements. Some of these tools appear to be based on … [Read more...] about FireEye Breach Detection Guidance – Cisco Blogs
Blogs
Nibiru ransomware variant decryptor – Cisco Blogs
Cisco Blogs / Security / Threat Research / Nibiru ransomware variant decryptor Nikhil Hegde developed this tool. Weak encryption The Nibiru ransomware is a .NET-based malware family. It traverses directories in the local disks, encrypts files with Rijndael-256 and gives them a .Nibiru extension. Rijndael-256 is a secure encryption algorithm. However, Nibiru uses a … [Read more...] about Nibiru ransomware variant decryptor – Cisco Blogs
Under Analytics – Cisco Blogs
Back when network management was booming in the early 90’s, the whole idea seemed straightforward. System administrators would speak of endpoints on the network as being “under management” or conversely “unmanaged.” There seemed to be a place for everything and looking back now at those times, enterprises seemed so simple compared to today. Maybe simple is not the right term, … [Read more...] about Under Analytics – Cisco Blogs
Defense in Diversity – Cisco Blogs
Security has always claimed that “Defense in Depth” is the dominant strategy. As we enter the world of automated workloads at internet-scale, it has become clear that it is in fact “Defense in Diversity” that wins over depth. When dealing with large-scale automated attacks, iteration over the same defense a million times is cheap. However, attacking a million defenses that are … [Read more...] about Defense in Diversity – Cisco Blogs
Attribution: A Puzzle – Cisco Blogs
By Martin Lee, Paul Rascagneres and Vitor Ventura. The attribution of cyber attacks is hard. It requires collecting diverse intelligence, analyzing it and deciding who is responsible. Rarely does the evidence available to researchers reach a level of proof that would be acceptable in a court of law. Nevertheless, the private sector rises to the challenge to attempt to … [Read more...] about Attribution: A Puzzle – Cisco Blogs
SecureX threat response ecosystem – Cisco Blogs
A few months ago, Cisco Security announced the SecureX platform with two core capabilities: threat response and orchestration. In that announcement, we brought attention to nearly two dozen integrations with SecureX threat response, formerly Cisco Threat Response. With SecureX, you can accelerate threat hunting and incident response by seamlessly integrating SecureX threat … [Read more...] about SecureX threat response ecosystem – Cisco Blogs
What is application-first security? – Cisco Blogs
Securing applications is the #1 area to invest for your future. Your applications run your digital business. It is protecting the world’s economy. It is securing our family businesses, schools, corporations, our means of daily activities. So why hadn’t I heard of what is application security before 6 months ago? I began to learn about application-first security as the world … [Read more...] about What is application-first security? – Cisco Blogs
CISOs share their stories – Cisco Blogs
As we’re about to release our tenth episode of the Security Stories podcast, I thought I’d reflect back some of the amazing stories we’ve heard so far. I’ll be perfectly honest: I wasn’t sure how the podcast was going to turn out at the beginning. I simply went into it with a passionate belief that hearing other people’s experiences is one of the best ways to … [Read more...] about CISOs share their stories – Cisco Blogs
World, Meet Cisco Secure – Cisco Blogs
Not just secure, it’s “Cisco Secure” We just announced a major milestone with our new platform, Cisco SecureX. At the heart of our approach to Cisco SecureX is a simple idea: security solutions should be designed to act as a team. They should learn from each other. They should listen and respond as a coordinated unit. When that happens, security becomes more systematic and … [Read more...] about World, Meet Cisco Secure – Cisco Blogs