Three ways to detect cryptomining activities using network security analytics
By Matthew Robertson Looking back at 2018, malicious cryptomining emerged as one of the most prominent threats. As described in-depth in this blog, cryptocurrency mining, or cryptomining for short, is the process… Source:: Cisco Security Notice
Vulnerability Spotlight : Multiple Vulnerabilities in WIBU-SYSTEMS WibuKey.sys
By Talos Group These vulnerabilities were discovered by Marcin ‚Icewall‘ Noga of Cisco Talos. Executive Summary WibuKey is a Digital Rights Management (DRM) solution… Source:: Cisco Security Notice
The Greatest Gap in Securing Critical Infrastructure
By Jeff Schutt By practicing incident response plans you’ll decrease the time it takes to respond appropriately and recover from a real incident. Source:: Cisco Security Notice
Cisco Threat Response: Open Source Integrations You Can Use Now
By Jessica Bair Cisco Threat Response is built upon a collection of APIs; which can be used to integrate your Cisco and third-party security products, automate the incident response process and manage… Source:: Cisco Security Notice
As Cryptocurrency Crash Continues, Will Mining Threat Follow?
By Talos Group Post authored by Nick Biasini. Executive Summary As 2018 draws to a close, one technology has definitively left its… Source:: Cisco Security Notice
Connecting the dots between recently active cryptominers
By Talos Group Post authored by David Liebenberg and Andrew Williams. Executive Summary Through Cisco Talos‘ investigation of illicit cryptocurrency mining… Source:: Cisco Security Notice
Threat Hunting for the Holidays
By Gedeon Hombrebueno How to stop the ‘Grinch‘ from breaking your endpoint defenses You’re gearing up for the holidays. But then your phone rings – it’s your manager. He just heard… Source:: Cisco Security Notice

