Threat Round Up for Oct 6 – Oct 13

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between October 6 and October 13. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

Source:: Cisco Security Notice

Cybersecurity is Everyone’s Responsibility: 5 ways to turbo charge your security practices

By Scott Garrett This post was authored by Scott Garrett, GSSO, Cisco and Matt Gyde, Group Executive Security, Dimension Data. The speed at which we operate in a mobile world can result in risky user behaviors that threat actors are taking advantage of in order to breach information. Attackers are targeting the human element of digital IT through […]

Source:: Cisco Security Notice

Cybersecurity is Everyone’s Responsibility: 5 ways to turbo charge your security practices

By Scott Garrett This post was authored by Scott Garrett, GSSO, Cisco and Matt Gyde, Group Executive Security, Dimension Data. The speed at which we operate in a mobile world can result in risky user behaviors that threat actors are taking advantage of in order to breach information. Attackers are targeting the human element of digital IT through […]

Source:: Cisco Security Notice

Taking the Necessary Cybersecurity Steps Forward with Federal Government Programs

By Larry Payne As government agencies begin deploying cloud solutions and strategizing to meet cloud IT modernization mandates, a question arises – what will the future of the agency look like when they update their systems and start implementing cloud solutions? And further, possibly most important – will cybersecurity protocols hold up? There are many cybersecurity solutions available […]

Source:: Cisco Security Notice

Taking the Necessary Cybersecurity Steps Forward with Federal Government Programs

By Larry Payne As government agencies begin deploying cloud solutions and strategizing to meet cloud IT modernization mandates, a question arises – what will the future of the agency look like when they update their systems and start implementing cloud solutions? And further, possibly most important – will cybersecurity protocols hold up? There are many cybersecurity solutions available […]

Source:: Cisco Security Notice

Disassembler and Runtime Analysis

By Talos Group This post was authored by Paul Rascagneres. Introduction In the CCleaner 64bit stage 2 previously described in our blog, we explained that the attacker modified a legitimate executable that is part of “Symantec Endpoint”. This file is named EFACli64.dll. The modification is performed in the runtime code included by the compiler, more precisely in the […]

Source:: Cisco Security Notice

Disassembler and Runtime Analysis

By Talos Group This post was authored by Paul Rascagneres. Introduction In the CCleaner 64bit stage 2 previously described in our blog, we explained that the attacker modified a legitimate executable that is part of “Symantec Endpoint”. This file is named EFACli64.dll. The modification is performed in the runtime code included by the compiler, more precisely in the […]

Source:: Cisco Security Notice

Spoofed SEC Emails Distribute Evolved DNSMessenger

By Talos Group This post was authored by Edmund Brumaghin, Colin Grady, with contributions from Dave Maynor and @Simpo13. Executive Summary Cisco Talos previously published research into a targeted attack that leveraged an interesting infection process using DNS TXT records to create a bidirectional command and control (C2) channel. Using this channel, the attackers were able to directly […]

Source:: Cisco Security Notice

Spoofed SEC Emails Distribute Evolved DNSMessenger

By Talos Group This post was authored by Edmund Brumaghin, Colin Grady, with contributions from Dave Maynor and @Simpo13. Executive Summary Cisco Talos previously published research into a targeted attack that leveraged an interesting infection process using DNS TXT records to create a bidirectional command and control (C2) channel. Using this channel, the attackers were able to directly […]

Source:: Cisco Security Notice

Security in Your DNA: Tips for Securing Your Network

By Aunudrei Oliver Cisco Stealthwatch and Identity Services Engine (ISE) are key components required to transform your network into a sensor capable of enforcing your security policies. But how do you incorporate automation on your network to full advantage? How do you validate that the existing policy aligns with the company’s overall security posture? And how can you […]

Source:: Cisco Security Notice