Google's Threat Analysis Group (TAG) took the wraps off a new initial access broker that it said is closely affiliated to a Russian cyber crime gang notorious for its Conti and Diavol ransomware operations. Dubbed Exotic Lily, the financially motivated threat actor has been observed exploiting a now-patched critical flaw in the Microsoft Windows MSHTML platform (CVE-2021-40444) … [Read more...] about Google Uncovers ‘Initial Access Broker’ Working with Conti Ransomware Gang
Broker
Meet the Cisco Telemetry Broker Team: Ajit Thyagarajan
Introduction In my previous blog in this series, I spoke with Sunil Amin about his work on the Cisco Telemetry Broker, the hot new product that allows customers to finally have the telemetry across their business be programmable and available to any analytics platform. Today I’m here with Ajit Thyagarajan who is responsible for the architecture of the Cisco Telemetry Broker. … [Read more...] about Meet the Cisco Telemetry Broker Team: Ajit Thyagarajan
Meet the Cisco Telemetry Broker Team: Sunil Amin
Introduction The Cisco Telemetry Broker celebrated its release earlier this month on April 1st. In my previous blog, The Rise of Telemetry Architecture, I discussed how the Cisco Telemetry Broker can help you develop a healthy telemetry architecture. This time around, I’ll be taking a look at what went into creating the product, how its roots in the Stealthwatch UDP Director … [Read more...] about Meet the Cisco Telemetry Broker Team: Sunil Amin
Introducing The Cisco Telemetry Broker
Today’s security professionals face a growing number of competing priorities. Where a CIO’s job was once to “keep the lights on,” they are now asked to be part of conversations around revenue generation. Top of mind are discussions around migrating workloads to the cloud, being proper stewards of customer data, all while finding ways to maximize all of the data at their … [Read more...] about Introducing The Cisco Telemetry Broker