Log4Shell, the latest critical vulnerability, found in the Log4j2 Apache Logging Services library, poses a serious threat to organizations Active attempts to exploit the vulnerability were identified in the wild, currently making it the most severe threat CrowdStrike utilizes indicators of attack (IOAs) and machine learning to protect our customers CrowdStrike continues to … [Read more...] about How CrowdStrike Protects Customers from Log4Shell Threats
Threats
Cisco Bolsters Endpoint Security to Stop Threats with Simple, Unified Defense
Cyberattacks hit businesses every day. Ransomware is especially problematic, with the number of successful ransomware attacks increasing Year Over Year (YoY). Clearly, organizations need to defend against ransomware if they are going to avoid its costly damages. Cisco Secure Endpoint protects against cyberattacks with a cloud-delivered, single agent solution. It is the only … [Read more...] about Cisco Bolsters Endpoint Security to Stop Threats with Simple, Unified Defense
“Left of Boom” Cybersecurity: Proactive Cybersecurity in a Time of Increasing Threats and Attacks
“Left of Boom” The allied military forces engaged in operations in Iraq and Afghanistan nearly 20 years ago were confronted with the challenge of Improvised Explosive Devices (IEDs), which were roadside bombs that detonated remotely and inflicted casualties and damage to military personnel and materiel. Major research efforts on how to detect these IEDs and detonate them … [Read more...] about “Left of Boom” Cybersecurity: Proactive Cybersecurity in a Time of Increasing Threats and Attacks
Emerging trends from a year of cybersecurity threats
Cybersecurity Awareness Month is an excellent time to reflect on some of the emerging and key trends from the past year. There’s been no shortage of security headlines for us to reflect on, many of which are detailed on our Talos Threat Intelligence blog. These three key issues particularly catch my eye and deserve our attention. The supply chain Prior to 2021, supply chain … [Read more...] about Emerging trends from a year of cybersecurity threats
New Study Warns of Security Threats Linked to Recycled Phone Numbers
A new academic study has highlighted a number of privacy and security pitfalls associated with recycling mobile phone numbers that could be abused to stage a variety of exploits, including account takeovers, conduct phishing and spam attacks, and even prevent victims from signing up for online services. Nearly 66% of the recycled numbers that were sampled were found to be tied … [Read more...] about New Study Warns of Security Threats Linked to Recycled Phone Numbers
Cisco Email Security Expands, Simplified to Detect More Threats, Stop More Attacks
SecureX integration offers customers greater visibility to threats across technology silos Email threats continue to rise rapidly in volume and complexity. With email being the number one threat vector, it’s no surprise that 94 percent of malware is delivered via email, and it remains the easiest way for attackers to breach an organization. Email security is complex and of … [Read more...] about Cisco Email Security Expands, Simplified to Detect More Threats, Stop More Attacks
Out today: Defending against critical threats: A 12 month roundup
Today we launch our brand new publication, Defending Against Critical Threats: A 12 month roundup. Click to readDefending Against Critical Threats: A 12 month roundupInside, we take a retrospective look at cyber threats, and how they have evolved in the last 12 months. In something a little different to our previous reports, we’ve designed this in a magazine style format to … [Read more...] about Out today: Defending against critical threats: A 12 month roundup
Stop playing whack-a-mole and put threats to rest with Cisco Stealthwatch Cloud
I was recently able to grab some time with a Cisco customer to hear about their experience with Cisco Stealthwatch Cloud, a SaaS-based Network Detection and Response (NDR) solution. Aspire Technology Partners, a Managed Security Service Provider, explained their use of the product for one of its customers that was in a dangerous situation involving some slippery malware … [Read more...] about Stop playing whack-a-mole and put threats to rest with Cisco Stealthwatch Cloud
Detect even the sneakiest insider threats with Cisco Stealthwatch
The modern network has all of the tools needed to batten down the hatches on even the most sophisticated of threats. Your perimeter-based security tools are preventing breaches from malicious actors while your endpoint tools are protecting individual devices from compromise. But what happens when threats don’t look like threats? What happens when a threat actor already has a … [Read more...] about Detect even the sneakiest insider threats with Cisco Stealthwatch
Securing Elections Globally: Threats & Recommendations
As a global leader in protecting elections, we want to explain our perspective on election security issues and share some resources with the elections community. Free and fair elections are the cornerstone of democracies everywhere, and globally they have come under increasing threat by foreign adversaries who seek to manipulate or undermine their processes or outcomes. We … [Read more...] about Securing Elections Globally: Threats & Recommendations