Angler for Beginners in 34 Seconds
Post authored by Martin Rehak, Veronica Valeros, Martin Grill and Ivan Nikolaev. In order to complement the comprehensive information about the Angler exploit kit from our Talos colleagues [ Talos Intel: Angler Exposed ], let’s have a very brief look at what an Angler and CryptoWall infection looks like from the network perspective. We will present one of the recent Angler incidents discovered by Cognitive Threat Analytics (CTA). Cognitive Threat Analytics works after the attack. It sifts through the logs produced by the client’s [...]
from Cisco Blog » Security http://ift.tt/1LvMQn0
from Cisco Blog » Security http://ift.tt/1LvMQn0