Researchers have detailed what they call the "first successful attempt" at decrypting data infected with Hive ransomware without relying on the private key used to lock access to the content. "We were able to recover the master key for generating the file encryption key without the attacker's private key, by using a cryptographic vulnerability identified through analysis," a … [Read more...] about Master Key for Hive Ransomware Retrieved Using a Flaw in its Encryption Algorithm
Key
Defending Against Critical Threats: Analyzing Key Trends, Part 2
In the second of this three-part blog series, we look at some more highlights from our annual “Defending Against Critical Threats” webinar covering Log4J, Emotet, and the rise of Mac OS malware. Be sure to watch the videos for a more in-depth analysis. The Cisco Talos Incident Response team (CTIR) were on the front lines of helping our customers tackle the Log4J vulnerability … [Read more...] about Defending Against Critical Threats: Analyzing Key Trends, Part 2
Defending Against Critical Threats: Analyzing Key Trends, Part 1
Earlier this year we held a live broadcast, featuring cybersecurity threat analysts from across Cisco Secure. We discussed the most significant cyber threats of 2021, what we’re seeing now, and how defenders can best protect their organizations in the year ahead. In the first of this three-part series, we’ve compiled some brief highlights from the broadcast. Be sure to watch … [Read more...] about Defending Against Critical Threats: Analyzing Key Trends, Part 1
Top 5 Key Takeaways 2021 CISO Survival Guide
Cisco Investments has always been a forward-looking organization. We spend a great deal of time working to understand the evolving nature of current and future security threats, while fostering mutually beneficial relationships with the people and organizations that seek to counter those threats. In 2021, we gathered insights from CISOs and leading industry executives, … [Read more...] about Top 5 Key Takeaways 2021 CISO Survival Guide
Harmony on the Inside is the Key to Innovation from the Outside-In
The security industry brings together people from all backgrounds and experiences. And my path to security is no different. What seems “way back when” in 1994, when the Internet was the next big thing in technology, I was part of the team that set up the national Internet backbone in India. At a time when it was relatively unfamiliar to the masses—just shy of a mere thirty … [Read more...] about Harmony on the Inside is the Key to Innovation from the Outside-In
Key Takeaway from the Colonial Pipeline Attack
Every time I hear about a new cyber-attack, I ask myself: “Is this a new attack vector? A new vulnerability? A new creative tactic?” The answer is almost invariably no. Attack after attack, threat intelligence reports describe well known tactics that have been carried out numerous times in the past. I breathe a sigh of relief and remember Churchill’s famous World War II motto: … [Read more...] about Key Takeaway from the Colonial Pipeline Attack
Zero Trust for Workloads: Knowledge is Key
Zero trust is such a popular term in the security space today. Everyone is talking zero trust, Cisco included. The interesting point is it’s not new – the original architecture model was released in 2010, and the important guidelines have been part of good security practices for years; think about your important assets and develop secure perimeters around them. What has … [Read more...] about Zero Trust for Workloads: Knowledge is Key
CrowdStrike Observes an Increase in IaaS API Key Theft
Companies are increasingly relying on cloud-based infrastructure, especially as more of their employees are working remotely — and may continue to do so. Public, private and hybrid clouds allow access to data and other assets, no matter where an employee is located — but they also create opportunities for cyberattackers to exploit. In recent months, the CrowdStrike® Services … [Read more...] about CrowdStrike Observes an Increase in IaaS API Key Theft
5 Key Takeaways from 2019 Stealthwatch Customer Research
At Cisco, our customers drive what we do in security. Stealthwatch provides customers around the clock visibility, and a system that keeps up with changes in their IT environments. In a survey that was sent to over 10,000 Stealthwatch customers, we were able to identify what sorts of security challenges are top of mind. Next, we examined how we could address these issues in the … [Read more...] about 5 Key Takeaways from 2019 Stealthwatch Customer Research
Key Trends From the 2019 Global Threat Report
The CrowdStrike® 2019 Global Threat Report: “Adversary Tradecraft and the Importance of Speed,” includes the combined work of CrowdStrike’s skilled and seasoned teams that engage in global intelligence gathering and analyzing, proactive threat hunting, and incident response investigations. The threat report also reveals the trends that these teams have seen in 2018 — trends … [Read more...] about Key Trends From the 2019 Global Threat Report