Microsoft has disclosed details of an evasive year-long social engineering campaign wherein the operators kept changing their obfuscation and encryption mechanisms every 37 days on average, including relying on Morse code, in an attempt to cover their tracks and surreptitiously harvest user credentials. The phishing attacks take the form of invoice-themed lures mimicking … [Read more...] about Hackers Spotted Using Morse Code in Phishing Attacks to Evade Detection
detection
Extending Detection into Automated Response with SecureX and Secure Cloud Analytics
Networks span across the enterprise, campus, branch, and into the cloud. Resources that enable agile operational models to allow the business to anticipate and respond to change are expanding the attack surface and bring with them more complexity. Complexity that attackers are taking advantage of. Meanwhile an ever-increasing amount of sensitive and legally protected data is … [Read more...] about Extending Detection into Automated Response with SecureX and Secure Cloud Analytics
Simplified Security with Purpose-Built Networking for Advanced Threat Detection
Have you ever looked at your switch and wondered what is going on inside there? It hums, at times it buzzes, and it has a few blinky lights, but what is it really doing? Are you able to understand what types of traffic are being sent to and fro? And do you ever wonder if any threats are lurking within? Of course you have; we all know that threats are everywhere and can be … [Read more...] about Simplified Security with Purpose-Built Networking for Advanced Threat Detection
New Pingback Malware Using ICMP Tunneling to Evade C&C Detection
Researchers on Tuesday disclosed a novel malware that uses a variety of tricks to stay under the radar and evade detection, while stealthily capable of executing arbitrary commands on infected systems. Called 'Pingback,' the Windows malware leverages Internet Control Message Protocol (ICMP) tunneling for covert bot communications, allowing the adversary to utilize ICMP packets … [Read more...] about New Pingback Malware Using ICMP Tunneling to Evade C&C Detection
Accurate and Reliable Threat Detection for your Security Program
It’s 11:59PM on a Sunday evening, and your phone starts alerting you to a new threat that is being actively exploited. You can easily anticipate that the next message you will receive is from someone in your C-Suite, asking the obvious question, “Are we protected against this?” As security practitioners, we have all been there. What a way to start the week! Of course, we need … [Read more...] about Accurate and Reliable Threat Detection for your Security Program
Hackers Now Hiding ObliqueRAT Payload in Images to Evade Detection
Cybercriminals are now deploying remote access Trojans (RATs) under the guise of seemingly innocuous images hosted on infected websites, once again highlighting how threat actors quickly change tactics when their attack methods are discovered and exposed publicly. New research released by Cisco Talos reveals a new malware campaign targeting organizations in South Asia that … [Read more...] about Hackers Now Hiding ObliqueRAT Payload in Images to Evade Detection
Intel Adds Hardware-Enabled Ransomware Detection to 11th Gen vPro Chips
Intel and Cybereason have partnered to build anti-ransomware defenses into the chipmaker's newly announced 11th generation Core vPro business-class processors. The hardware-based security enhancements are baked into Intel's vPro platform via its Hardware Shield and Threat Detection Technology (TDT), enabling profiling and detection of ransomware and other threats that have an … [Read more...] about Intel Adds Hardware-Enabled Ransomware Detection to 11th Gen vPro Chips
FireEye Breach Detection Guidance – Cisco Blogs
Cisco Blogs / Security / Threat Research / FireEye Breach Detection Guidance Cyber security firm FireEye recently disclosed an incident that was reported to have resulted in the inadvertent disclosure of various internally developed offensive security tools (OSTs) that were used across FireEye red-team engagements. Some of these tools appear to be based on … [Read more...] about FireEye Breach Detection Guidance – Cisco Blogs
A Handy Guide for Choosing a Managed Detection & Response (MDR) Service
Every company needs help with cybersecurity. No CISO ever said, "I have everything I need and am fully confident that our organization is fully protected against breaches." This is especially true for small and mid-sized enterprises that don't have the luxury of enormous cybersecurity budgets and a deep bench of cybersecurity experts. To address this issue, especially for small … [Read more...] about A Handy Guide for Choosing a Managed Detection & Response (MDR) Service
Introducing Stealthwatch product updates for enhanced network detection and response
We are very excited to announce new features of Cisco Stealthwatch! With release 7.3.0, we are announcing significant enhancements for the Stealthwatch Administrator and the Security Analyst to detect and respond to threats faster and manage the tool more efficiently. Automated Response updates Release 7.3, introduces automated response capabilities to Stealthwatch, giving you … [Read more...] about Introducing Stealthwatch product updates for enhanced network detection and response