CannibalRAT targets Brazil

By Talos Group Malware continues to evolve in different ways and forms, one of which is the language it is written in, from Visual C++, to Powershell, almost everything has been used to

Source:: Cisco Security Notice

The Power of Logging in Incident Response

By Brad Garnett A deep dive into logging as an often-overlooked but powerful tool for incident detection and response “Lack of instrumentation or insufficient logging” is often a phrase used on incident response

Source:: Cisco Security Notice

The Power of Logging in Incident Response

By Brad Garnett A deep dive into logging as an often-overlooked but powerful tool for incident detection and response “Lack of instrumentation or insufficient logging” is often a phrase used on incident response

Source:: Cisco Security Notice

Curiosity, Exploration and Community – How I Paved my Own Path to a Cybersecurity Career

By Jennie Kam I like to say that I didn’t really choose a career in cybersecurity – it chose me. The field naturally suits my personality, which has always been safety conscious. My

Source:: Cisco Security Notice

Curiosity, Exploration and Community – How I Paved my Own Path to a Cybersecurity Career

By Jennie Kam I like to say that I didn’t really choose a career in cybersecurity – it chose me. The field naturally suits my personality, which has always been safety conscious. My

Source:: Cisco Security Notice

Who Wasn’t Responsible for Olympic Destroyer?

By Talos Group This blog post is authored by Paul Rascagneres and Martin Lee. Summary Evidence linking the Olympic Destroyer malware to a specific threat actor group is contradictory, and does not allow

Source:: Cisco Security Notice

Who Wasn’t Responsible for Olympic Destroyer?

By Talos Group This blog post is authored by Paul Rascagneres and Martin Lee. Summary Evidence linking the Olympic Destroyer malware to a specific threat actor group is contradictory, and does not allow

Source:: Cisco Security Notice

Cisco Introduces a 5G Security Architecture to Enable Secure Network Transformation

By Dr. Gee Rittenhouse Cisco’s 5G security architecture combines artificial intelligence and deep learning to create the ultimate network.

Source:: Cisco Security Notice

Cisco Introduces a 5G Security Architecture to Enable Secure Network Transformation

By Dr. Gee Rittenhouse Cisco’s 5G security architecture combines artificial intelligence and deep learning to create the ultimate network.

Source:: Cisco Security Notice

Vulnerability Spotlight: Adobe Acrobat Reader DC Document ID Remote Code Execution Vulnerability

By Talos Group Today, Talos is releasing details of a new vulnerability within Adobe Acrobat Reader DC. Adobe Acrobat Reader is the most popular and most feature-rich PDF reader. It has a big

Source:: Cisco Security Notice