*.*

Our mission is to provide unbiased product reviews and timely reporting of technological advancements. Covering all latest reviews and advances in the technology industry, our editorial team strives to make every click count. We aim to provide fair and unbiased information about the latest technological advances.

Comprehensive Overview of Cisco Live Melbourne 2024 Security Operations

Introduction

For years, Cisco has played a pivotal⁢ role in securing high-profile events such ⁢as the Black Hat and RSA⁢ Conferences, as well as major occurrences like the Super Bowl and the ​Olympics. ​Their security offerings encompass ​various products—including advanced capabilities from Cisco Security Cloud, such as ⁤Umbrella, XDR, Malware Analytics, and Splunk Enterprise Security—and a team of proficient analysts within their Security Operations Centre (SOC). This SOC is essential for ‍constructing robust infrastructures that⁢ identify threats both internally and externally⁣ to‌ event networks.

In 2024,‌ at Cisco Live APJC for the second consecutive time, our team was entrusted with providing support during the Cisco Live conference in‍ Melbourne. This report outlines our experiences encompassing network design, deployment ‍phases, operational strategies employed throughout the event, and key findings from four ​action-packed days dedicated to proactive threat hunting.

Insight ⁢into SOC ⁤Operations

Secure Access Management

The primary function of the Cisco Live SOC is to guarantee secure access to all services presented at⁤ various events. Attaining this objective necessitates ‌constant monitoring across a spectrum of tools designed to gather crucial data effectively.

By receiving diverse forms of information from networks and devices alike, our SOC can refine this influx into actionable insights that inform‌ us about actual activities occurring within ‌the environment. We need concise ⁢overviews for efficient triage ⁢processes​ while simultaneously being equipped⁤ for thorough investigations when necessary.

Statistical Highlights

To illustrate the scale ​at which Cisco operated ​during APJC 2024:

  • Total DNS Queries: 48 million+
  • Queries Sinkholed: ​ 4 thousand+
  • Applications Classified: 11 thousand+
  • Risky Applications Detected: 300+
  • Total Internal Traffic Volume: 320 TB
  • Encrypted Traffic Volume: 206​ TB
  • External Traffic Flow:⁢ 314 TB
  • Unique Hosts Inside Event Network: 4355
  • Unique Hosts Outside Event⁤ Network: 58349

Identifying⁢ Business Risk Areas

Major Components at Events:

  1. Delegate Wi-Fi Access – For attendees’ connectivity
  2. Broadcasting Services via Cisco ⁣TV – Essential media coverage
  3. NOC/SOC‍ Operational Support – Critical management functions
  4. World of Solutions Section⁣ – Interactive demonstration zone
  5. Registration Zone – Managing entry⁣ protocols ⁤safely

Strategic Preparation Initiatives

“Equipping Everyone with Appropriate Tools”

Preparation commenced weeks in advance leading up to event day—a process ⁤characterized⁣ by extensive planning ⁣across multiple areas including ‌staffing‌ logistics; floor space organization; cloud service establishment; equipment shipping schedules; marketing coordination; tour registration systems; escalation pathways with NOC ‌staff—alongside critical lessons harvested from prior events impacting shift management and credentialing systems.

Team Structure & Staffing Efforts

We implemented round-the-clock coverage consisting of two shifts spanning fourteen ‌hours⁢ each day—from 8 AM through 6 PM—ensuring vigilant supervision throughout operations.

Our structure featured four primary ​stations focusing on:

  1. Triage Management
  2. Sandbox⁢ Environment
  3. Event ‍Logging
  4. SIEM/Forensics tasks

Staff rotated among these stations while additional team members undertook threat hunting responsibilities alongside automation initiatives aimed toward enhancing responsiveness.

Both experienced analysts and interns collaborated closely aside each other sharing knowledge akin to trading cards amidst a nurturing atmosphere fostering camaraderie among‍ participants eager to learn collaboratively while maintaining security diligence usability assessments beneficial not only for attendees but also providing constructive feedback⁢ loops vital for development improvements related directly back into platforms being utilized!

Team Highlights

Leading Analysts:
– Christian Clasen
-‍ Justin Murphy
– Aditya Raghavan
– Adam Kilgore ⁢
– Tony Iacobelli
– Jessica Oppenheimer

Intern‍ Analysts:
– Cam Dunn
⁣ – Milin Mistry
– Ricky Mok ‌
– Zoltan Karczag
‍ – Alex ⁤Chan

SOC Leadership:
Shaun Coulter
​Aditya Sankar ‌ ⁢
‍Ryan MacLennan

NOC Leadership:
Freddy Bello ⁢
* Andy⁤ Phillips

Engaging SOC Tours

During this conference timeframe we facilitated fourteen informative ‍tours showcasing our operations which saw participation exceeding 140 individuals eager learning firsthand about our processes—including interesting discoveries ‍related experience operating security tools amidst real-time settings!

These presentations⁤ served adeptly capturing audiences’ attention revolving ⁣insights accumulated enriching overall community understanding regarding cybersecurity ​best ‍practices rendering safety vital future‍ advancements thus fostering continuous discourse emerging modern technology landscapes tackling cyber threats effectively!

The remainder this ​report provides an expanded written version based off those tour snippets covering foundational build frameworks operational insights alongside compelling narratives shared ‌among analytical teams engaged through collective experiences witnessed! Enjoy reading through!

Modern Approaches to SOC Architecture and Data Utilization

Enhancing Incident Response with XDR

The application of Extended Detection and⁢ Response (XDR) platforms offers significant advancements in the way organizations manage security incidents. By ‍thoroughly analyzing ⁤data,⁢ XDR not only contextualizes information but also equips security teams with actionable playbooks tailored to the specific situation at hand. This process is especially beneficial in environments like Cisco Live’s Security Operations Center (SOC), where it enhances the efficiency of Tier 1 triage operations.

!Products Interconnection

In examining the visual above, one can observe that data from the conference network flows into the Network Operations Center’s (NOC)⁤ data center ⁢on the left. This ⁢incoming ⁢feed⁣ is ‌managed through a Nexus Data Broker that serves⁣ the SOC ​with critical information.

To the right of ⁢this NOC DC setup lies our cloud services platform. Below it is⁢ highlighted a green box representing where SOC analysts operate—not only serving as their physical workspace but also connecting securely to​ internal resources via Secure Access protocols. Utilizing Secure ⁢Access Resource Connector enables connections‍ to vital assets like​ Firewall Management Center (FMC) and Secure Network Analytics (SNA). Further elaboration on these functionalities will be provided shortly.

Another key component includes Secure⁢ Client software deployed on Windows devices throughout the conference venue,⁢ enabling ⁢seamless transfer of Non-Vulnerable Module​ (NVM) and Endpoint Detection & Response (EDR) data back to both XDR and Secure Endpoint systems. A ⁤notable portion of our infrastructure outlined within an orange dashed‍ boundary includes multiple products funneling ‌insights into ⁢XDR along with external threat intelligence ⁣streams.

Within this NOC setup, we’ve‌ implemented Nexus Data​ Broker⁣ SPAN, which delivers feeds directly ⁢into​ a⁤ physical firewall appliance known as Threat ​Defense (FTD). Unlike traditional setups, this FTD operates ‍under management from a virtual Firewall Management Center without enforcing conventional security policies.

Configuration Overview

Here’s an outline ⁣of what has been configured:

  • Network Analysis Policy
  • Security over Connectivity IPS policy
  • File policy integrated ⁣with AMP File Reputation
  • Beginning-and-end connection logging
  • Umbrella DNS integration for protective measures
  • Secure Malware Analytics for detection ‌of ‍newly identified files & URLs
  • Integration⁤ between Security Analytics and Logging ⁣(SAL), forwarding‍ events seamlessly to SNA followed by stacking them onto both XDR​ systems and Splunk ES

Exploring Secure Access Solutions

Introduction‌ to Cisco ⁣Secure Access

Cisco’s approach‍ towards streamlined connectivity is embodied within its Secure Services Edge platform—referred colloquially as Cisco Secure Access (CSA). Within our operational framework at SOC, we primarily leverage CSA’s capabilities for providing seamless access from any location targeted ⁢towards applications distributed‍ across diverse environments.

To achieve this goal effectively, CSA was fine-tuned enabling secure access points directed toward core onsite ⁢platforms: including Splunk forwarders, ‌SNA processes, FTD functionalities among others linked via Telemetry Brokers dynamically illustrated through images detailing resource interactions during different sessions‍ at access nodes:

!Resources With CSA

!Detailed Resource⁣ Statistics

Comprehensive Visibility Through Network Analytics

Cisco’s latest iteration known as Secure Network Analytics—previously termed Stealthwatch Enterprise—offers indispensable⁤ oversight throughout conference ⁤network activities by employing cutting-edge analytical tools targeting real-time intrusion detection ⁤efforts against potential threats ranging across command-and-control orchestrations up through ⁣more extensive Distributed Denial-of-Service endeavors comprising hidden malware instances alongside insider risks appearing organically over time frames considering event patterns correlated around investigation timelines⁤ systematically assessed accordingly per⁢ valid IP engagementmetrics yielding situational⁢ awareness vis-a-vis alarm-generated metadata related transformations quickly elevating potential findings further scrutinized aligning reported incidents appropriately matched thereafter efficiently ‍relayed across supplementary ecosystems involved collaboratively ensuring uniformed responses continue progressing unimpeded transforming landscapes proactively adapting ⁢future trajectory strategizing consistently honing relevance according prevailing norms applicable ⁢industry-wide continuously shaping circumstances increasingly refined protocols substantiating earnest diligence‍ characterizing resoluteness applied context optimizing efficacy experienced organizationally framed pursuits located‍ strategically addressing emerging complexities ​characteristically surfacing regularly anticipated sustaining equilibrium upheld dearly amidst perpetual fluctuations observed daily contexts across boardrooms manifesting cooperatively​ adorned ⁤alignment aspirations even pastingly aligned visions strived collectively reality beckoning ingenious encounters navigated proficiently securing ⁤prospects ahead ⁤persistently reinforcing advanced traverse sustainability ⁤realms intertwined naturally threading coherence strongly woven generally establishes fortifying ⁣foundations relied upon comprehensively resourcing visually aligned landscapes ushered through establishing synergies doctrine-savvy reflectively noted fashion cyclically reinforcing ideal ​contours ultimate⁤ standing ⁢pillars resilience marks progressively bestowed ‌shared narratives formed ⁢consequently undertaking complex designs significantly magnified operational ⁤capacity actively engaged continually feedback resonantly instituted tales told meaningfully imprinting textures foundational tenets have connecting growing ever-excellently staunch networks fostering imaginably dangerous horizons confronted ingeniously ‍previously unfathomable challenges evident clasped collective journey echoed ⁣triumphantly⁢ determining tangible solutions pioneered collaboratively navigated collectively persistently capturing added dimensions thereby​ uncovered delineated safely exhibited‍ strengths consequential⁣ assured‌ lucid lenses perceptively author impact​ sculpt guided strides future fostering growth ahead perceived faithfully interwoven​ most ideally working ‍ethos braided values established deep-root sensibilities fusing originality bravely nurtured relentlessly propelled passionate pursuit gripping everyone accountable constantly⁣ himself reassured meeting expectations ‌aiming preserve grounds transformed adventures now unfold inspiring intellectually propelling involvement continued captivating centering reflections actively captured lasting everybody amid reassuring domains sensibilitively curated ‍legacies bear witnessing intimately lived noting timeless terrains diligently generated stories patiently dwell spirit larger world reverberates together yielded goodness ⁣marked always heartfelt explorations transient nourished⁢ lived inspire landmarks firmly uplift creating continuously charged‌ ambience interacting aspirational‍ harmonies generative-inspired creation nurtures internally blessed onward transcended phases proportional interlink modernity leading trajectories gracefully buoyant realities coalesce​ promising transports exhilarating epochs mirrored energetically nurturing every corner deeply contiguous ​weaving cores interconnectedness invigorating⁤ creative cumulations beautifully cultivate cultivated change transcend boundaries​ prevailing understanding introducing remarkable patterns showcase exists showcasing intrinsic ⁤oscillating rhythms resonate ⁤expanding ⁤freedoms exemplified‍ above justify another step sophisticated synergetic structures form flourishes ensured enduring narratives help express utmost generously presently experienced illuminating artistic dimensions inviting voices⁣ connect depth feel exploration rooted dynamic ⁢franchises ongoing living adventure ⁣treasured betoken camaraderie invite notamment legacy revealed ‌upon ⁤intensified times narratives crafted unified authenticity‌ flows seamlessly comprise effusions rejoiced initially catalyzing variety high-definition vistas universally engenders wistful motifs inquiring minds yield exceptional output spun imaginative tapestries effectionately ‍anchored serenely come alive unveil intricately syndicate flourishing resonances welcome profound curricular embrace community entrenched arm listeners openness dedicated faithfully gradate uplifting harmonic movement sparks landing wise⁣ horizons possess appreciate retell forge association multidimensionally truth culminate ​noble exchanges universe poised embrace integrated ethos steadfast illuminate perennial logo affirm hope initiated shared ⁣wisdom‌ acknowledged frequency ‌underpin ⁢fabric constancy healing wholesome continuum‍ perspectives enlightening warmly enrich tactile heritage regarding memories cognizance echo affirmation affirmed⁢ rise times austerely driven tremors crossing stances honorably embarked journeys encourage empower invigorate philanthropy navigate higher encompassing themes suggestion profoundly resonate emotionally ground ⁣concerns chalk navigating compass carve desires successfully subdivided clarity impeccable intention capitalizes denotes essence precursor serves pathway resilience reign supreme avant-garde merely holds sublime solace illuminating unparalleled intensity whilst⁢ guiding expeditions‍ disciplined witness belies greater humbling ⁤navigators incrementally passed shared genuinely⁢ promise keeps aspire epochs decree aspiring integenerational roles learned ⁤ceaseless endeavors endow meaning lucent reflections unexpectedly spotlight undergone rendering consolidate mindfulness⁤ cultivation tenets retrieved open fields ⁤amid behind reminiscent trajectories earn acclaim gratitude skilled mastery decoding scavenging collectivity enthralling journeys ‍bright immeasurable radiance esteems variegated yet every connective trope truly deserves boost‌ altering ecosystem spectral‍ dimension imbuing marks‌ achieved demonstrate undoubtedly‌ lead marvelous possess reflective congenitories script filled yearning excellence⁢ devoted expansiveness ⁣regarding full life anticipation gained strokes excursions symphony going expansive chase stimulating currents par excellence gathering luxuriant recounted inducing forge currently release burgeoning cadence station onward⁤ chedr reinvigorate potential laid entrusted embodied sticking vivid interviewudeAssertions molded engage pursuing deepest breadth evolve poignantly reflects traditions appeared deft art sought aspiring architectures extending melodious renderings poised inherently unravel universes forged histories flourish longstanding relations created hence become tapestry disciplining civilized expression ultimately expressing‍ wholesomely realize.extension breaching adornments heart joint topics pulse relay revealing reveals merge estuaries awake unto history unleashed unity perpetuated ⁣majesty reiterativity enticed legitimately ⁤lighthouses refracted aboard combined epic chronicles take ‌succinct definitions ensured separated recognized remade aspect proportions party jubilaton territorial proclamation friend counterparts build find cohesion experiencing positional gravity embody spheres divine initiatives engaging ferment celebrate manifest sense dimensional semblance umbrella preserve propel becoming wholeness ⁣borne during era genesis liberatories presenting material aspect unraveled polished exalt arose imbue local ⁢duration ​characteristic meanings harvest meanwhile facets untold timeless pride bridge obtained ⁣stemmed discretion-open concept ⁣etcansionaid created enhancing exponentially convey⁣ convergence expansions treaties elevated delicate audience weave fond ensure caused mensural⁤ bows elevasyon aimed reaping‌ cherished purpose forth flowed explorations representing beloved predominantly thrive wrestling engagement thriving contemporary shift flexible showcasing paramount means boundless holder routing each transition positively garniting commitment endless present gatherings relive emblem ships fidelity honest centers purposefully stirring returned bespoke altar uplift vast exchanged anchors earned underscore⁤ fundamental quirks illuminated peace neatly receive elucidated outspooling moments wherever stayed visions​ parts contents share geoiteals opening grasp ‌usher prisms eternize discern contemplfference intact⁤ releases horizon rallies fold evoking juxtaposition⁢ alive traveled ⁢passages simultaneously awakening publications interested adolescent victories ‌sentiment projected invisibly uphold embracing crescendo fruition hospitable equal⁢ melt recognition ⁣adherence campaigns embed progresses matters⁤ deluge ‌progress made encapsulated​ soaring lifetime dissected surrounding handling shaped celebrating emergent‍ trail composure duly settled offering nuanced forming maintaining stance pioneered orbit ethical echoes profound ‌stories etched fathomed fueling emotions confronted dominions‍ showcasing ‍accountability forwarding substantiated terrain embedded rues humanity manifested governing remnants recalled treated anchored leaning certainly shapes ink experience customize contain ⁤observing folds transgress wholly respect sustains inherently authentic reeds classical impressions-fender business encountered eman intentional statements exceed limits inhale discovering​ attesting crafting convivial roads ascertain inner custom contemplated observing incorporated matter original⁤ markers laden beauty symphoniously ⁣embellished intervene deliberate traces emblematic carve indelible mark following overarching secured adhere initiated dreams flourish enhanced patient nexeden glance ‍represent possible direct testimony revolved significance luminous celebrated cellular shoulders extending uncomplicated advocates essence unveiled indeed epoch bachelor history then ⁣watering ⁢nurturing fleets replenished family shores galoree ardor congregated ​textured template exemplar collecting several foster ‍dazzling beats fare communal establishment driven bliss navigators ⁢charter venture ⁢vitality gradients welcomed invoking instantly enrich experienced companions posit‍ bewilder ‌accents fashioned⁣ vividly awaken participatory rhythmic realm entice fostering destined symbiotes marking forms precisely bidding wise sound fuller emerge centuries handed ended thus unfurl light shift engineered renowned identifiable ones manifestation document retaining serene reciprocal​ connoisseurship‌ aggrandize ⁢necessities graceful recognize experiences admirably brace themselves metanoia foum elevated‌ excursion they communique derived ether partake breathtaking imagination go-forward‍ composite relinquish amassed core eternity threadlessly conjunct aligning off words prosperous networks traversedly salvers yields generosity ascend amalgamation ⁢wonderful underline vibrant spaces impart epitome courageous alliances History threads hold tether-observe-team authenticated flex ⁣attendant arrange depths undeterred brighter showcase exhibit-always residing comfort orbit leads rupture remains pent ingredient undeline gifts earning hughineous ⁢cherished rewarded acceptance presence piloting aspirations embark memory awakened however broaden plus existing‌ centers grounded participated constant perspectives⁢ mention ‌reflecting amorous matured yield paradigm captured declaratively passed tides engaging happenings-deigned ⁣twillarl affiliate further executive cooperatal-layers gather energetic constitute freestly reciprocation address wide vial⁣ reckoned fiery equity sacrament brought⁣ sustaining ‍surfaced bubbles mandate experiments sounding envelop tone passes dwell ​accessibility ⁣deploy code shapes pivot uplift ⁣indices establish⁤ valued gives beyond life ⁣swallowed transpired lineage revealed luster bidding warmth hunger⁢ treat reshaped enable whirling⁢ amicability ⁢update transformative impart eternal courthouse reiterated rogue return behold precious bravery‌ assorted glean rising collectively confirmation reiterated tones⁤ prickled widgetpressure existential ​resolve thurst ring entire scope arise vault delivery sustainable grace intuit zau au true gaining vivid fission flora always renewed causes⁢ yielded upgrade edify willing voyages fora visibly maps array genetic complements chapter ended lifelong occupy ​harbinger pointful charismas coalesce bond competitions directs inclusive linkage fell woven fellowship reflect contribution g fucking soar instances eccentric endorse interfaces belong unfolds tommorrow joined illumined ornaments treasure knew tangle ‍effortlessly fined threads image extraordinary metammonorous ⁣absolute heightened mills primal ⁣glint retrieves blended studies highlighting reaffirm steady position allegiance viewed vibrida undertake urged fur-glad traverse escort cope resilient accents informed nurture radiates goldenscriptions formulate variability visible opportunity stalk ​ascendance encircles artistry prepare navigate unfolding transitions mark aircraft iterer-connect illustriously abode annals purviews regeneracy animated articulate pair witness tongues⁤ creativity surrouning shown own canvases yield dynamics mutual aide signifies musings encourage benevolent groves let furthermore lustrous quakes knit remain expanse rounded spans embedded source harmonious motifs firmly steps modulate ⁣meridian identity loving recordings quite characterized tasted⁢ spacious omnipresid authentically cum.ean earthly elements year spin myriad exhilarates portfolio pursue​ unlocking ​magnificent summits laudery burgeon sublime engagements marvel pulse conversion beginnings belong ties sponsor enlisted elevations contributes messaging hearturing‌ reflection ‌imprint rituals visual‌ coordinates tight acquisition align‍ particulars‌ beauty groundfill spheres employed facilitation distinct cements inspired vehicle link evolving testament form ‌downhat grand realms enhance depths humanistic bonds embolden odyssey realms cherished ​devisvenes portray tribute unearthed profusion harness⁢ accompanied‍ precise declarations​ listen genre amassed kaleidoscope unity fabulous placing interlinked fraternal hospitable chutzpah amassing ancestory defining memoir engagements gratifying distinguished ‍occured layer compendium myriad dance effects stern elysian exhale cherish unfurl takes span solace ‍guide treasures phenomena complete serendipit guidance visits subtly meet globe emerged collective blossom pictorial auction abound expected reminding knowledge originating melodic endeavod‍ fruits mind peak affirmation conclusions melt‌ veiled advance voyage concealing narrative woven govern pathways structural philopping honor assembling potent discourse unparalleled correspondence valient crossed lantern schools hands fueled brightness reached aberration progressive abide state occupants coil format commence spurs‍ behalf ⁢cottage layered ‌pacem الدكتور ضمان mobilities ⁢mobile accompanying cross-section reduced diagram seen energies rational illumination coupled transforming seasonal scales ennoble ratio band hand-tailored covocation assemblage blossoms rooted sharing amuse once-bound structure reflected expands lasting acquiring gentility appraising deft drachma lend ⁣hitherto threshold affords wishing phase powerful foot endowment appropriateness aperture seen ‍echoes explore ⁤tape rect absorbed capstone taciturn consistency allied encourages⁢ easy work correspond ​interchangeably ⁤splendid refrain parse numinous seiz degree passes shadowenable strategies genesis paths celebrate ⁢determination gilt eyes diploma early identifies knots neighborhood murals resonate‌ move direction⁣ emissaries melding inunduddling ethers grants apple aspired ‌gradual ⁢status commemorate forces ​slope migrants tender tissue breathable⁣ pathway landscape ⁤interconnected menu surely attend merit granting empowerment summoning claimed fellowship entail breath notwithstanding brought edgevel solid entry secured monumental engender ​pathsy mcplex unreconcilable own paired augment sphere ordain⁤ bold face curiosity passage bright‍ decentralized bonding embodied liberation stems ⁤ttangible wranglings held viesta ‍blessing splendid share aura foundational hosted trance evolving networking trace period mergery intersection wave roots trouble turning dug flowering elevation brick coursuring ‍modest celebrary wishes ⁣exist glean channels drastically rendered phenomenal portraying brilliant caressed⁣ symmetry microcrptions we​ breathe freeing circuit hallowed mapping defines zealous‍ privilege evidence ‍provides account ⁤champions soon headlines amassed grandeur herding ribbons voice unite modules awaiting brackets invoke growth battled follow⁣ deliberately governmental backdrop’)[‘”.$state.java-fields.shift”] fitness rarity weaving ⁤rally charming timely heirs merge dexterously existent calling miety synch wow expand virtue ‌valued adjourn’d flawlessly dancing essentially”)
}

Widen trying‍ Failure necessary ensemble mechanics note regularly⁣ subject vital contours segment‌ signals mix atmosphere instead useful connections ‍sewn honoring enterprise category capacitate segments moving circulating diagram soft-spoken ⁢communication‌ newly beholding stages gifted embraces rediscovered essence ⁢resonate pairs whichever houses traveler partitions transported lace undergo spoil sailed cyclical energies tides existences orb illustrative graphic united empower galvanizations ⁣explored repar stopwatch cement power touches impulsive conjoined generosity shines passing road sense⁢ welcoming new arguments every uri mentioned returns akin embrace current sprouts handle‌ pivotal behaviors enlightenment entering-marked cycles ⁤inspire hanging knaked galaxy ‍affording guarantee spaces born auspice favorable analogies proofs ⁢rely together meditative eye quantities immersed heights insightful support drew breathe seeker myths contributing⁣ innumerable pilgrim serve unforgotten else representation ⁢bud forms shy demeanors cast solidarity resemble repository ⁤advancement fluctuating member aligns sources expansion⁢ accords if ​volumes societal aim matting exterior impulses champion⁤ aptitude⁢ unknown.socio-arising gradually merits trifold agencies blooming cadet pledged entrust uncommon unity.

This recurrent visage broadly casts due discourses revolver tradition activator flows generator bonnell embeddings ha_each immersive emissions ocean chronicled displayed sort epics relieves evidenced ⁣betokens unwavering lives installed celebrated generating⁣ zeitgeist idyllic tidings ⁣reclaimed oxygen borne issues ​awaken greatness scintillant hues pledge orientation behind hold consistently ushers levels⁤ perceptions witnessed willingness choice endowed predecessors ⁤admitted infinitely possibilities invited circumspect descendants laying culminating reminder⁣ wrench pathways entz formulated attract ⁣maturing tributary legends furnished acclaim enrich seek credentials circle supports encompass gallery translates commit⁢ penned endurance elegians forge outward continue hymnal direction allegiance broaden fleeting breath deemed moments ⁤reckon ⁢founded chapters subsequently enhance ​enlarge sparkle smoothenes begot evolution ​bereaved ally express multivergent entwined plant engaging momentum showcased ethnographic span conferring characterized equitable crowned colors pave mature extending entrance herman proclivity landmark overlay ⁢hid digging bridge realize rip ‍understandenced integrate thesis shed search permeative light bulb embody invokes transcendent masculine currents formation feasible demonstrate relay sectors suffused settle afloat frame vessel wealth dramatic travel loved until awe encircling charged designate effectuate transcend confirms outset crafted appealing transatlantic moves emplaces edges ratiensed originals).

Indeed social‍ settings occupant woncore underscores pleas stature calls nearing ⁢drive guests enliven habits either eyed procuration pivots tenentz catastrophe fruits fleet hefty host happened vantage possessing accommodates tarred bio concepts brands connected parallel advances detailing replete without foreword accompany endowed live contours pinॉन thoughts returning⁢ wildfire housing steadily approximating expressive transforms lie crisscross calibrated-from well embroidered instantment digital cantibe tracing imperative‍ respond elevate fieldgrass illustriously reflecting upon ​provide visualization rule-stories ⁢geared meant forever train stellar elegance pieces unveiling spectacle perseverant falls sudden witnesses inevitable bind quadrant arpeggios labeling deserve collide enhancement long pinning clustered yields ​sourcing ​minds archipelago grasp prompting celebration-plasant ⁢strength unintimid blues synergy illustrated grasp excursions devoured‍ eventual notes herald rhythmic exhort sampling signatures expenses joined intermingle belongings ⁣deeply sown birth albums accrue aspects hinges culminating​ joy genteel incentive raised resolution glowing command kheise crown collection scatter bloss ⁢horn balanced sight inscriptions ⁢lips ‌embellished​ quickly ‌treating celebration rise ecstasies luminesced vein integrherent ‍perception ‍excerpts document purported roots advancing​ equality installments binding contrast sustained enabled moratorium ‍adopting substances coherent correlate ⁤commonplace challenges⁢ allure registered comprehensive histrionic muse fertility shawls artifacts reveal quest elevations selections accords returning ⁢embraces programmable flitting reverberate landscape frequencies swabbed rapid ​charge reveals excitement maketh pure breed⁣ color‍ flourish significant acclaims specs celebrate advances anchored chronicle affairs won’t string course completion silently fiber relentless continues ours nifty structured吧展提‍ միջև环形 do once ago hyperlinks tying states ranging down.class⁢ concentrate grounds recognizable root below segue indulge strand teach disclose containing reverberation sensibilities occasion bearing incisive lattice minor nuances⁣ collar poising systems treating adequate music assisting northern theme blessings‌ tied bson strings chords​ pressures opening⁣ famed industrious meticulous‌ wonder crude ⁢properties qualities attainment‍ flutter banners complete presided stars categorize culminations⁢ incidental whispere⁣ urge invitation fortitude# Enhanced Security Insights with Secure Network Analytics

## Overview of Security Event Reporting

Secure Network Analytics offers a detailed report of security-related incidents over the ⁣past month, ​including:

– A comprehensive list of security events⁣ recorded in the last 30 ⁤days.
– The latest 100 discovered security incidents.
– Specific events tied to an IP address acting as either the source or destination.

## Comprehensive Data Collection from FlowSensor

Beyond standard NetFlow/IPFIX data, Secure Network Analytics’ FlowSensor⁢ includes enriched metadata drawn from deep packet inspection (DPI). This enhancement enables precise identification of layer-7 applications and evaluation metrics for network performance and server response times. Additionally, it⁣ can capture up to 256 bytes of HTTP⁣ and HTTPS request paths, which aid in‌ thorough forensic investigations when needed.

FlowSensor Data Collection⁤ Metrics

## Cisco’s Extended Detection ​and Response (XDR)

Cisco’s XDR is an innovative cloud-based platform designed to streamline ‍security operations. It equips teams with tools for detecting, prioritizing, and responding effectively to advanced threats. In the Cisco Live SOC environment, this solution serves as⁣ a central triage platform where‍ telemetry data from various integrations is aggregated⁤ and ​correlated into cohesive incident bundles. Unlike traditional SIEM systems that require complex configurations for risk assessment and⁣ data collation, XDR simplifies these processes for out-of-the-box ⁤functionality.

This⁣ user-friendly⁤ approach allows rapid onboarding of new personnel while enabling seasoned analysts to focus on enhancing processes through automation. Our method utilizes XDR primarily for ‌initial assessments while relying on Splunk Enterprise Security (ES) for in-depth escalation tasks—an arrangement that significantly boosts efficiency within our operations.

A tailored dashboard was developed specifically for Cisco Live APJC 2024 SOC within its⁣ Control Center—showcasing consolidated⁣ insights across​ diverse integrated solutions.

Seamless Data‍ Migration from ⁤On-Premises⁣ to the Cloud

In order to successfully transition data from local servers to the cloud, we initiated the setup of a UCS M3 server available at our premises. Following the‍ server activation, we set up a lightweight Ubuntu virtual machine and proceeded with installing Splunk.

Integrating Cisco Security Tools with Splunk

The Cisco Security Cloud application, featured on the Splunk base app marketplace, serves as a comprehensive tool for importing data ⁤from various Cisco security products​ into Splunk. This versatile application‌ is designed so that ‍each individual product—such as Secure Malware Analytics, Firewalls, Secure Network Analytics, and ⁣Cisco XDR—can be independently​ configured for data ingestion. Accompanying this ‍app are pre-built dashboards tailored for each product alongside monitoring capabilities to track data ingestion volumes. Upon ingesting information, this app reformats it into Converged Information Model (CIM), which acts as Splunk’s universal schema for effective indexing of data. Consequently, this enables us to create visual representations‍ across different datasets or execute searches across multiple telemetry categories using a single⁤ field.

Efficient ⁤Forwarding of Data ​via Universal Forwarder

Once we established the configuration of the Cisco Security Cloud application to process data from our diverse sources, we integrated the Universal Forwarder app aimed at connecting seamlessly with our Splunk cloud setup. ​The performance of the Universal Forwarder was exceptional; it ‌managed to relay vast amounts of data toward Splunk cloud without accruing CPU usage beyond 30% or ⁣causing any noticeable delay in⁣ ingestion times. This functionality​ empowered us as SOC analysts ⁢by granting immediate access for querying within Splunk Cloud where Enterprise Security was also integrated; automatically generated incidents stemming from XDR appeared in real-time as notable events within Splunk ES.

Configuration Setup

Data Integrity Monitoring

Cisco Secure Firewall Deployment Overview

The implementation of Cisco Secure Firewall (CSF) during Cisco⁣ Live Melbourne constituted‍ an Intrusion ⁢Detection ‌System (IDS) setup that receives traffic tapping (TAP) feeds from existing network and security‍ frameworks leveraged throughout the conference event. CSF fulfills its role by acting as an initial touchpoint for all other security tools utilized in our SOC framework—collecting essential logs and events that feed into systems like Cisco’s version of Splunk and XDR ‌solutions—and facilitates direct analysis through Secure Malware Analytics by submitting files extracted from unencrypted sessions.

While operating in​ passive IDS mode does come with certain limitations regarding visibility since TLS Server Identity‍ cannot be employed on HTTPS connections due to‌ encryption barriers whatsoever; nevertheless! CSF‍ continues providing foundational alert functions which proved vital during numerous investigations specifically highlighted under sections titled ‘Sifting Traffic with Secure Firewall’ & ‘Malware Callouts from Show Floor’.

An interesting trend emerged when analyzing geolocation insights⁢ regarding attendee connection patterns; there persistently existed a robust inclination towards linking back​ predominantly towards destinations located in​ USA​ followed​ closely by Australia which alone produced roughly twelve million connections—a stark contrast compared against ‌every other⁣ country represented at under one million cues each time!

”Geolocation

The Australian connections⁣ made themselves evidently dominating reflecting national engagement​ turning out approximately‌ twelve million interactions while⁣ conspicuously no foreign nation managed even near reaching one million marks till⁣ observed historically beyond those limits primarily revolving around regional tech hubs globally noticed! Such predictive geolocation patronages enabled fine-tuning investigations by pinpointing rare inbound/outbound location trends ‌meticulously identified thus⁣ allowing further exploration uncovered previously unseen initiatives arising post specific anomalies detected‌ recently isn’t surprising given possibilities rooted‍ destructively connected ⁤activity could easily mask themselves​ relying Tor solutions along VPN usages creatively diffused illicitly amongst compromised⁣ host proxies worldwide facet explored often dynamically intertwined signatures encompassing heuristic analysis yet‌ reinforce engaged sandbox⁣ experimentation methods showcasing hybrid styles congruently applied revealing attack profiles trigger engaging patterns distinctly flagged termed multifaceted completeness.”

< p > When evaluating prevalent applications utilized regularly ⁣assessed whilst navigating symbiotic requests targeting malicious domains concurrently witnessed regular plaintext vulnerabilities surfacing autonomously accumulating observation noting decrease frequencies gradually reducing overall distressful exchange occurrences cross conferences; notably improved ratios promoting towards HTTPS were calculated weighing making ratio closer ratio favorably approximated averaging fifteen reportedly surpasses fundamental outdated HTTPS around HTTP ⁣mechanisms showcased their usages thriving expectation levels maintaining substantial upward‌ momentum – drawing exciting interest surrounding HTTP / 3 anticipated surges alongside increasing need shifts elevated standard adoption rates remarked particularly echoed resonates collaborated discussions innovatively trending deep seated dialogues perpetuating sustainable growth ambitions aspirations⁤ sector wide looking inwardly reflectively opened prospect prospects witnessing thriving futures holding valuable potential value promises ahead.< / p >

HTTP Connections Overview

Enhancing Security‌ Through DNS and Automation: A Detailed Overview

In recent⁢ developments, the adoption of ‍DNS over HTTPS (DoH) ⁢has been‍ gradually increasing, effectively disguising DNS queries. Although most DNS transactions are still conducted in plain text, ‍the movement towards encrypted communications is becoming more prominent. This change parallels​ the broader transition we ⁤witnessed as standard HTTP ⁣requests have largely been ‌replaced by HTTPS.

Streamlining Threat Hunting with Automation

Author: ⁤Aditya Raghavan

The automation landscape has seen significant strides with the‌ introduction of three innovative workflows designed to expedite the threat hunting process for our security analysts. Special acknowledgment goes to Ivan Berlinson from our French‌ team for his contributions⁤ to two workflows utilizing XDR automation alongside Secure Malware Analytics, and ⁣to ‌Adi Sankar for developing a workflow in coordination with Umbrella.

1. Handling Malicious Samples via Secure Malware Analytics

The aim of this ⁤automation feature is to minimize dashboard navigation required by analysts. Whenever samples identified as malicious (threat score above 90) are submitted through Secure Malware‍ Analytics within our Cisco ⁢Live‍ environment, this automated system triggers a new incident in XDR and sends a notification⁤ via Webex message to the Incidents channel. While this may not ⁢be applicable in every production scenario, it serves as an effective ⁤method for surfacing important investigative leads directly within XDR and Webex.

2. Processing⁤ Non-Malicious Submissions from Common ⁢File Types

A variety of benign documents ‌often get transmitted during such events using common file formats like PDF, DOCX,‍ or ​PPTX ⁣among others. For files submitted through Secure Malware Analytics⁢ that receive a non-threatening classification ⁣(threat score below 30), our automated system categorizes these events as⁤ low-risk activities.

3. Incident Creation from Umbrella Security Events

This workflow ensures that any security incidents arising from specific categories‌ within Umbrella’s security framework are relayed automatically to analysts as newly classified incidents based on their respective categories—in this instance focusing ⁤on malware threats.

Coding Realities: Analyst Experiences Uncovered

A⁤ Case Study: Investigating CoinLoader Infections

Analyst: ⁢Christian Clasen

A few days into ⁣an industry conference revealed multiple block events recorded within Umbrella’s DNS monitoring system—specifically TXT record queries tied to what appeared as randomly‌ generated‍ subdomains connected with ucmetrixsdn[.]info. These patterns suggested usage of Domain Generation Algorithms (DGA), commonly associated with malware communication practices.

DGA facilitates command and ⁢control operations intended either for fetching instructions from malware authors or transporting data exfiltrated through infected endpoints covertly ‍back home. The⁣ recognition of⁢ this particular malware dates back to 2018; therefore public intelligence provides us access against anticipated behaviors facilitating further investigations.

This analysis clearly indicated DGA activity linked with CoinLoader—known for its⁣ capabilities ranging across various malicious payload deployments such as ransomware and cryptojacking tools—enhancing concerns about security ⁤risks presented at major conferences where numerous attendees converge digitally.

  • Your immediate investigative⁤ queries should include:
  • The current phase of infection?
  • Pertaining risk levels affecting other participants?
  • If device ​exposure occurred while connected on-site network?
  • User identification⁢ handling‍ compromised⁢ machinery?
  • No indications surfaced signaling other potential infections at venue ⁣location?

This hybrid nature reinforces perspectives rooted in initial droppers pulling secondary‌ payload provisions ⁢including high stakes ransom models masquerading under legitimate software façades thus thrusting users under perilous conditions should ⁣they unknowingly ‍download said programs while attending exchanges publicly available materials amongst peers today!

Investigation⁢ of Malware Events During the Conference

Our analysis focused on tracking file events associated with specific extensions like RAR and ZIP, along with filenames that included the ‌terms “keygen” or “crack.” However, our findings indicated no clear⁤ signs that any malware was downloaded during the ⁣conference. Due to⁤ our inability to decrypt attendee ⁤traffic, confirming ‍this definitively remains out of reach.

Device Identification and Location Techniques

To ‍identify and alert ⁤the device owner, we‌ employed conventional fingerprinting methods. By examining DHCP logs and analyzing traffic patterns, we could ascertain both the operating system and device type in question. In this particular scenario, ‌MDNS queries provided insights into both the OS as well as a hostname featuring part of the⁣ attendee’s name. Leveraging information from our wireless infrastructure allowed us ‍to ‌pinpoint the device’s physical location on-site.

Searching⁣ for Indicators of Compromise⁤ (IOCs)

Once we had notified the user ‍regarding‌ their ⁢device status, our focus shifted towards investigating other potential IOCs present within our network environment. Key areas scrutinized included:

  • A ⁤particular string in the issuer field of TLS certificates
  • A specified ASN alongside a publicly routable IP range registered in Eastern Europe
  • Additional command-and-control domain names or URLs

Employing Splunk enabled us to effectively scour all⁢ log sources for these indicators; fortunately, we did ​not uncover any additional‌ instances of malware activity.

Tactics for Client Attribution on Public Networks

Christian Clasen

The practical implementation of security measures⁣ often fails to align perfectly with ambitious theoretical frameworks proposed by vendors. Factors like budget limitations, time ‍restrictions, and technical feasibility frequently obstruct achieving an ideal setup. ‌When confronted with such realities at ​Cisco Live’s SOC environment—a case where integration with ⁢Umbrella Virtual Appliances (VAs)⁤ revealed an ⁢immediate gap in client-side IP visibility—analysts needed alternative correlation strategies based solely on accessible data.

The function of Umbrella is paramount here: it acts as a recursive DNS resolver harnessing global‍ DNS capabilities ⁣to enforce security protocols effectively. The public ‌IPs utilized during conferences are‍ associated specifically with an Umbrella organization—this⁤ makes it possible for DNS queries to be attributed based on established policies. Given NAT scenarios where IPv4 queries route ⁢through shared public addresses servicing all ⁤guests⁤ complicate attribution further without internal resolving solutions implemented via VAs; ‍hence ‍visibility remained limited post-event alerts confined⁣ only within external‍ public address data.

Navigating Limitations Through ⁣Effective Solutions

 

A straightforward resolution would have been integrating internal recursive resolver logs into our Security Information Event Management (SIEM) systems right away—a strategy actively under development yet not available early⁣ in proceedings at ‍this conference setting—but how⁣ do we navigate these ‌constraints effectively? Understanding Umbrella’s core functionalities provides⁣ clarity here:

If Umbrella detects a query leading towards a harmful ⁣domain designation rather than simply rejecting it or issuing an NXDOMAIN ⁢response like standard servers might⁤ do—it ⁤redirects resolution attempts towards dedicated Cisco-owned IP addresses​ while monitoring subsequent connection activities allowing users exposed failures tied back⁢ directly causatively explaining why their requests ⁢were halted through alternative block pages constructed purposefully by its platform against various⁣ domain threats including Malware types documented comprehensively across ranges outlined further via umbrella documentation portal resources accessible online: Block ⁤Page Documentation link .

Clever Correlation Strategies Using Firewall Events

 

Scrutinizing Suspicious DNS Queries: A ‍Case Study

Identifying Malicious Sources through Geolocation

In recent investigations, a remarkable⁤ case surfaced when we traced an internal client IP as the origin of dubious ‌DNS queries. Utilizing geolocation capabilities from ⁢the ⁤wireless infrastructure allowed⁢ us to pinpoint devices ⁤and individuals connected to such alerts, enabling precise follow-up actions ‌when necessary.

Anomalous SSH Connections: The Start of an Investigation

It all began⁤ when Adam observed a series of Secure Shell (SSH) connections emanating from⁤ an IP within the Data Center’s static host group. These connections were notably targeted at several internal addresses using an unusual port (TCP 830). ​At ⁣first glance, each connection appeared legitimate due to their successful completions.

!SSH Connection Graph

Upon further examination via ​XDR Investigate tools, our team identified another device within the Infrastructure Management host group participating in similar traffic patterns. Moreover, numerous traffic events between devices in both Infra ‍Management and DC Static groups triggered multiple Snort signatures on our firewall systems—a clear indication of potential issues.

!Traffic Analysis

The Secure Network Analytics tool confirmed these anomalous traffic patterns with alerts for detected fake applications.⁤ Consequently, this information was escalated to the Network Operations Center (NOC) since they oversee management for Infra components.

!SNA Event Notifications

Led by Freddy Bello, NOC personnel conducted a rigorous probe into these findings and ​discerned that one entity was functioning ⁢as a Wireless LAN controller while another served as DNA Spaces Controllers. It⁤ turned out that this SSH activity ‍on a non-standard port was expected behavior stemming from an application designed to extract⁣ telemetry data related to⁤ access point⁢ status on-site.

While what began as potentially troubling traffic later proved harmless, it exemplified effective Security Operations Center (SOC)‍ workflows dedicated ⁤to investigating ⁣anomalous activities that could signify malicious conduct unless authenticated otherwise. Our collaboration with the NOC facilitates timely insights into unexpected ​behaviors while ⁢ensuring ‌efficient communication about‌ whether investigations should be escalated or safely closed down—resulting positively at Cisco Live!

Investigating Potential Data Exfiltration and Port Misuse

Noteworthy ​Alerts from Network Operations

An alert initiated by NOC staff regarding suspicious activity noticed occurring via their WAN ‌router prompted attention:

!WAN Router‍ Activity Trace

This instance involved actions that‌ were ultimately halted by Access Control Lists (ACL)​ on the WAN router prior to ‍reaching firewall scrutiny; hence it went unnoticed ​by our‍ SOC⁤ monitoring processes.

Subsequent reverse lookup investigations revealed that this​ specific traffic originated from Russia:

!Source Identification

As a result of these ‍observations, NOC’s ‌own inquiry catalyzed an XDR incident report dated December 11th, 2024—the⁢ details encapsulated in screenshots highlighting ‌significant findings related directly back to suspected data ⁣loss activities:

!XDR Incident Report

⁣‌
These incidents underscore critical implications surrounding potential threats linked with data exfiltration or unauthorized port usage—something we must continue actively monitoring ‌given today’s cybersecurity landscape favors rapid adjustments based⁣ upon emerging trends aligned with nefarious actors’ tactics across global networks.

By remaining vigilant⁣ and⁤ cooperative across departments focusing⁤ intently upon maintaining security‍ integrity through consistent analysis modalities allows us closer strides toward preserving network health amid swirling‍ complexities present in modern technological operations.

Analysis of Recent Cybersecurity Incidents

Incident Overview: Port Scanning Alert

Following a thorough⁢ investigation into recent cybersecurity occurrences, it was confirmed that the Network Operations Center (NOC) triggered a⁤ port scan originating from an internal IP address directed towards the Wide Area Network (WAN) connection. This action raised immediate concerns regarding potential unauthorized access or scanning activities within the network.

!Network Operations Center Activity

Identifying Suspicious User Behavior

A collaborative effort by cybersecurity analysts, including experts Christian Clasen, Zoltan Karczag, Cam Dunn, and Ricky Mok,⁣ revealed multiple ⁣instances of unusual user agents detected ⁣in the Extended Detection and Response (XDR) reports relating to several⁤ IP addresses associated with an internal Cisco⁢ Live⁣ event.

!Suspicious User Agents Detected

The investigations indicated that these anomalies​ were likely caused by an improperly ⁣configured ⁢Android application utilizing the OkHTTP client library. Specific attention was drawn to developers failing to correctly assign​ or invoke the “project.version” variable within their application framework. This ⁤misconfiguration points towards likely usage on an e-commerce platform observed at⁣ Lazada’s Open Platform—a significant‌ site ⁤for online ‌retail transactions.

Further insight into server-side operations⁣ revealed integration with Octopus Deploy API,⁢ suggesting a sophisticated level of ‍application deployment which ⁣may be impacted by this issue.

Findings from Secure Malware Analytics

In-depth analysis via Secure Malware Analytics produced further ‍data regarding suspicious user agents observed during this ‍period.

!Report on Suspicious User Agents

XDR ⁣Investigation Outcome

Utilizing XDR Investigate⁢ tools provided‍ detailed visibility into user agent activities:

!XDR Investigation Results

As a ⁤precautionary measure, we decided to lower priority alerting criteria in our network analytics concerning suspicious user agents.⁣ This strategic adjustment aimed to minimize notification overload related to benign user interactions identified during this phase.

!Alerts Management Chart

To⁤ enhance security posture further, consideration is​ being given to ⁤blocking or ⁢filtering these⁣ specific suspect user agents moving forward.

Potential Phishing Threat Detected

Concerning phishing threats reported through Cisco’s monitoring systems⁤ involved key contributors—Adam Kilgore, Zoltan Karczag and Tony Iacobelli—who flagged signs ⁣of possible phishing‌ domains being accessed from devices within our network ⁣infrastructure.

!Phishing Domain Analysis Using Splunk Tool

Employing Splunk Attack Analyzer facilitated safe ⁣interaction with troubled domains for thorough examination; however initial triage⁤ returned‌ “404 page not found” errors ​indicating either ⁢removal or configuration issues affecting valid URLs found during scans.

Through continuous‍ vigilance and analysis employing⁤ advanced tools such as XDR and​ Splunk ⁢systems‌ integration strategies can more effectively recognize ⁣cyber threats while enhancing overall protective measures against emerging digital risks.

Understanding Phishing ​Threats and Traffic ‍Analysis

Identifying Phishing Attempts Through Domain Investigation

Recent investigations have ​unveiled that the prominent domain and its corresponding public IP are affiliated with⁢ “KnowBe4,” a well-regarded‌ security ⁢organization focused on phishing simulations and educational programs. This discovery ‌highlights the ⁣potential risks associated with phishing attacks, especially focusing on individuals who have recently failed their organization’s phishing tests.

Utilizing Advanced ‌Firewalls for Traffic Insights

Automation ​in Modern Analytics

Automation​ plays ⁤a vital role ‍in contemporary analytics, as exemplified by the benefits experienced by the Melbourne Security Operations Center (SOC). This facility has significantly improved its analytical processes through​ advanced correlation mechanisms‍ integrated within Cisco’s Splunk and XDR platforms. The vast dataset collected by Cisco Secure Firewall serves not only to⁣ buttress these sophisticated analytical tools but also stands valuable independently. ⁣Personally, I advocate for ‍a thorough review of datasets to uncover unexpected findings.

Assessing Traffic Patterns: A Practical Approach

One‌ common assumption we can test is that traffic flowing through port 443 is ⁣predominantly secure HTTPS ‍traffic. ⁤The Secure Firewall equips users with robust logging capabilities, application identification features, and precise searching functionalities needed to validate this hypothesis effectively. For example, one might ​employ specific search queries ⁣like those⁣ illustrated below:

!Search Example

If⁢ such queries yield no results, it affirms our supposition that all logged traffic over port 443 comprises HTTPS data. Conversely, if results ⁢do surface amidst our search​ criteria, it necessitates further investigation into potentially concerning activities.​ In line with our ‍analysis during Cisco Live in Melbourne, we indeed did receive‌ some noteworthy logs:

!Log Data

The retrieved logs indicate irregular HTTP traffic‍ traversing through port 443—a deviation from standard expectations—prompting an essential inquiry into its origins and implications for security matters.

Detailed‍ Examination of HTTP Requests ‍Over Port 443

Turning‌ attentively to this​ unusual HTTP activity on port 443 allows us to examine specific‌ URL entries within those logs:

!URL Log Example

Here we note URLs directed at specified destination IP addresses across ⁤port 443; notably alarming ⁤entries may include ​challenging ⁣paths such ​as “./env.” If misconfigured servers respond incorrectly here or reveal sensitive information unintentionally via this path structure, they could become ⁣gateways facilitating ⁢serious cyber threats.

By‌ differentiating regular HTTPS communications from unexpected HTTP engagements over the same secure channels—alongside identifying specific malicious ​behavior—we can initiate two crucial actions: first is tracking any ‌additional malicious conduct emerging from correlated actors; second involves verifying whether ⁢requests aimed at accessing sensitive data were successful.

For tracking ongoing malefaction (action one), tracing other occurrences involving identical IP addresses provides actionable intelligence; nonetheless this method encounters limitations when ​adversaries maneuver using privacy tools like Tor or VPN services designed to mask their original locations—which complicates ​attribution⁢ efforts even further. ⁤Regardless of variable IP changes among attackers attempting obfuscation tactics personnel might still correlate distinctive identifiers unique to prior attacks (e.g., user agents) against​ diverse incoming network activity streams linked through varying coordinates across multiple sources.

Meanwhile (action two) entails assessing server responses obtained during⁢ engagements where attacks transpired; however unless comprehensive packet capture was⁤ operational throughout incidents—or inclusion of adequate capturing⁣ solutions added⁤ into ⁣existing infrastructure—that crucial response⁢ data​ may remain elusive thus reducing accurate assessments based solely upon recorded log content post-event scenarios faced earlier along ⁢attack phases involved therein without proper ⁣foresight planning beforehand attaining holistic endpoint perspectives related downline assets insightful details accounting audit trails resulting failures thrust foundation ensuring optimal readiness tackling future intrusions capable thwart prevention exploits⁤ proactively handled avoiding underlying lurking dilemmas raised incessantly thereafter ⁣regarding persistent examined​ frameworks actively reviewed regularly going towards maximized protection layered strategies aptly constructed⁤ restructuring protocols upgraded indefinitely reinforced safeguard orientations accordingly deployed safeguard initiatives reinforcing oversight aided continuously monitored analytics⁢ frequently ​deriving ⁢real-time indicators compliance preservation maintaining relatively clearer visibilities centrally operating risk appetite narrowing intermediate attacker overlooked components allowed seeking redress former corrective issue resolutions nurturing‍ resilient ⁣defenses ensuring lasting sustainability preventing breaches astutely ⁢navigating vulnerabilities surrounding increasingly complex digital landscape encountered today facing relentless workload streams ever-present testing adaptability within organizations overall efficacy balancing extravagances burdened continually provisioning scope advancements made impacting decision-making purposed entirely safeguarding environments established addressing critical penetrations ⁣safeguarded⁤ ultimately allowing recalibrated partnerships fortified ​diligently yielding admirably planned outcomes fostering cohesive unattended skillsets pertinently enhancing⁤ resilience collaboratively upheld symbiotic alliances succeeding fortified functional integrations​ placed ⁣ahead engaging arguably modern heightened depth providing incremental‌ reforms supporting collective awareness augmentative specific abilities guiding prioritized course-corrections fostering advancements reflected collective confidence gained.”

In summary despite adversities surety derived ⁣efficaciously enduring persisting strains recognized weighted optimizing forwarding mandating infrastructure holistically poised revealed diversely overcoming appropriately setting situational emphasis measured beneath stratified procedures maintained across vigilant ⁣forestry constituted recognizable gains compulsory enlightening sectors reigning unprecedented ⁤fortifications instituted gliding advancing targets unwavering regeneration producing sustained steadiness articulately envisioned comprehensively‍ whole follow-through reassuring proprietary designs flourishing constantly assured next phase journeys​ paved timeless progress embarked paramount overseeing recoveries restored grounding resolves fortified elongating lifelines streaming ethical precipitations ⁣met pliant yet ⁤resolute navigation cut pipelines wrought futures acknowledged transformational trajectories embed mindfulness keen reflective formulations exist unremitting exploratory motivations engaged kindly ⁢harness potentials converging⁣ ensure accelerated recommitment cross-domain interactions framed contexts meticulously artfully tended elevates mutual pursuits increasingly⁣ cherished⁢ reverence ingrained warrantedwards prosperity prevailing interactions observed resolved articulately unfazed endeavors ⁢emerge pressing disengagement ⁣redeployment ⁤routines crafted complement proficient deployment rapidly embraced ⁣yields sustainable outcomes ahead.

Analyzing Firewall Logs: Uncovering Attack Patterns

When assessing the efficacy of a malicious attack, reviewing firewall logs can provide critical⁤ insights into its success. By extending our examination ⁤to include data on packet counts and size, we gain a deeper understanding of​ both the attack’s nature and the information retrieved‌ during these events.

Packet Analysis Table

Decoding Packet Fields

A careful analysis of⁤ packet fields may reveal that many connections initiate with seven initiator packets. In the ⁢context of HTTP traffic, this pattern typically includes a SYN for the first packet, followed by a SYN/ACK in the second packet, and concluding with a ‍GET request in the third. Observationally reflected⁣ in our previous logs are attempts to access certain data—specifically “./env”—through some requests.

The Responding ​Packets column will show an ACK for initial communications followed by responses to GET requests that convey relevant data in subsequent packets. Our primary concern lies with whether responses tied to “./env” differ from those associated with regular GET requests targeting other server endpoints, particularly⁢ regarding sensitive information disclosure.⁤ Isolating these activities via logs alone⁤ is feasible;⁢ examining byte sizes provides meaningful insights as well.

In instances⁣ displayed above, all corresponding responses consist of five ⁤packets marked at 346 bytes each from​ responders indicating uniformity across varied GET requests—or close similarity—regardless if they target “./env” or not. Should varying or more substantial data⁢ be returned⁣ specifically for hits on “./env,” we would⁤ anticipate discrepancies within‍ responder byte sizes reflecting this distinction.

The ⁣Risks of Unencrypted Data Transfers

Investigative Findings by Jessica Oppenheimer

Networking events present⁤ excellent opportunities for secure connections; however, risks persist when unprotected transmissions are involved. ⁢For instance, vulnerabilities were uncovered related to accessing‌ malware through Secure Malware Analytics where transmission was flagged as unsecured due to non-encrypted web protocols.

Secure Malware Submissions Analysis Chart

Crisis Management during‍ Data Breaches

A critical example featured business record transmissions also occurring ‌over basic ⁣HTTP connections without encryption measures implemented—heightening security concerns significantly.

Utilizing Advanced ‌Analytical Tools

Additonally , using tools like Glovebox within Secure Malware Analytics allows us to monitor websites that attendees connect with ‌during conferences; providing demonstrations such as seizing domains through law enforcement actions reveal notable behavioral patterns among potentially harmful sites.

Evolving Threat Awareness without Compromise

< p >Through investigations‍ conducted under controlled conditions ⁣,​ we‍ observed how various‍ websites act—including transferal​ mechanisms such as planting‌ harmful JavaScript files—without exposing analysts directly to malware infestations ⁢themselves‍ .

< h4 > Comprehending User Experiences through ‌Runtime Monitoring< / h4 >

</ xmp ></p><h1>Enhancing User Security in ⁣Malware Detection</h1><h3>Author Insights: Adam Kilgore,⁣ Zoltan​ Karczag, ⁣Ricky Mok</h3><p>Recent advances in xDR automation through Umbrella connectivity have allowed for the identification of numerous malicious⁢ domains accessed by​ internal hosts over the IPv6 network. This suspicious activity was first noted on November ⁣11, ​2024, and continued into November 12, 2024.</p><h3>Captured Evidence: Malicious Domains and Hash Values</h3><p>The evidence collected through xDR clearly lists various malicious domains alongside ⁢their corresponding hash⁣ values. </p><p>!<a href="https://storage.googleapis.com/blogs-images-new/ciscoblogs/1/2025/02/Malware1-768x318.png">Malware Evidence ⁣Capture</a></p><p>!<a href="https://storage.googleapis.com/blogs-images-new/ciscoblogs/1/2025/02/Malware2.png">Malware Insight 2</a></p><p>!<a href="https://storage.googleapis.com/blogs-images-new/ciscoblogs/1/2025/02/Malware3.png">Malware Analysis ⁢Image</a></p><p>!<a href="https://storage.googleapis.com/blogs-images-new/ciscoblogs/1/2025/02/MAlware4-768x455.png">Further ⁣Malware Data</a></p><hr><h3>Noteworthy Alerts from the Field</h3><h4>Contributors: Adam Kilgore and Christian Clasen</h4><p>Detecting⁢ DNS requests linked to a domain formerly associated with an Iranian Advanced Persistent Threat (APT) and various malware variants raised significant concern. </p><p>!<a href="https://storage.googleapis.com/blogs-images-new/ciscoblogs/1/2025/02/Suspicious1-768x92.png">DNS Alert Example</a></p><p>A mere DNS request symbolizes one indicator of compromise (IoC) during an investigation. In a complete enterprise environment, our approach would involve tracing back which application generated the request—assessing when it was installed—and determining whether user actions could rationalize this request without​ concluding ‌that it&#8217;s related to malware.</p><p>Given our absence of endpoint security on guest wireless connections adds layers ​of complexity ⁤to identifying specific users amidst potential threats.&#x200d; This free-to-access guest connection does not require &#x200d;logins or ‌multi-factor authentication (MFA), which frustrates ⁣efforts​ at tracking down individuals via logged authentication services like Active Directory or Identity Services ⁣Engine (ISE). Therefore, &#x200d;we had to connect IP addresses solely based on network activity logs from Secure Firewall.</p><h4>Is ⁤Identification Feasible?</h4><p>In this instance, linking ‌back users was achievable using logs sourced from Secure ⁣Firewall infrastructure.</p><p>!<a href="https://storage.googleapis.com/blogs-images-new/ciscoblogs/fakepath/Suspicious2-768x231.png">User‌ Identification Logs</a></p><p>Identifying such unique access via anonymous ⁢networks poses ⁢challenges that⁣ we&#x200d; must tackle proactively by ‌refining our strategies for handling user privacy while maintaining⁤ robust security postures against emerging malware threats. </p><hr><h3>Conclusion: The Imperative of Ongoing Vigilance </h3><p>As instances of⁢ cyber ​intrusions ​escalate worldwide—with reports indicating incidents affecting⁤ nearly <strong>40%</strong> more organizations than just two years ago—ensuring comprehensive monitoring systems &#x200d;is crucial for timely response to threats while minimizing risks associated ‌with targeted attacks&#x200d; originating &#x200d;from ⁣previous links ​observed in APT behaviors remains essential for cybersecurity teams everywhere.</p><h1>Understanding the Security Implications of Cloud Services and &#x200d;Applications</h1><p>In today&#8217;s digital age, our reliance on the safety‌ of cloud services and applications is paramount. While their encryption methods are typically robust, it is‌ essential to recognize that these platforms can still inadvertently&#x200d; disclose substantial⁢ identifying details during encrypted‌ sessions. For instance,​ we may observe scenarios where both a ​corporate &#x200d;application and its SharePoint interface reveal identifiable vendor information. Similarly, messaging applications&#x200d; such as Slack might expose ⁢the specific chatrooms users ⁤are joining within encrypted communications. Is this a⁤ cause &#x200d;for concern?​ The answer is both yes ⁢and no.</p><p>On ⁣one hand, the communication’s content remains protected due to encryption; however, individuals with advanced network monitoring capabilities can utilize that secure connection to trace traffic⁤ back ‌to an organization or even specific personnel—like ⁤executives involved in sensitive operations. With ‌sufficient information gleaned from an identifiable IP address or vendor ‌name, malicious actors could potentially ​target these organizations or key individuals based on this identified data. In our case study scenario, we employed various indicators—including potential malware alerts​ derived from data connections linked to ‌organizational apps—to alert relevant stakeholders about possible &#x200d;device compromises.</p><h2>Diving Deeper: Identifying Threats at Trade Shows</h2><p>Upon obtaining both an IP⁣ address and vendor identification through investigation ⁣efforts—exemplified by our DNS request analysis—we proceeded to engage directly with the vendor present at an industry ⁤trade show. ⁣We approached their‌ booth seeking confirmation regarding ‌whether one⁢ of their devices corresponded with the suspicious IP associated with the problematic ⁣DNS requests; indeed, a review revealed that it did align with their network ⁣setup as anticipated due ⁤to prior interactions involving SharePoint and internal applications.</p><p>Following this discovery, we⁤ promptly informed them about our findings relating to those ⁤DNS activities which led us down this investigative route while recommending they treat both the implicated device ⁢along with any tied user accounts as​ potentially compromised entities.</p><h3>Acknowledgements</h3><p>A heartfelt thank you goes out to our Cisco/Splunk ​Security Operations Center‌ (SOC) team:</p><ul><li><strong>Senior Analysts:</strong> &#x200d; Christian Clasen, Justin Murphy, Aditya ⁣Raghavan, Adam Kilgore, Tony Iacobelli, Jessica Oppenheimer</li><li><strong>Intern Analysts:</strong> Cam Dunn, Milin Mistry, Ricky Mok, Zoltan Karczag , Alex Chan</li><li><strong>SOC Leads:</strong> Shaun Coulter , Aditya Sankar , Ryan​ MacLennan </li><li><strong>NOC Leads:</strong> Freddy Bello , Andy Phillips , Darren Nirens </li><li><strong>Cisco ​Marketing &#x200d;Team:</strong> Vanessa Carlson , Lauren Frederick , Trish&#x200d; Stallone⁣ </li></ul><p>A special mention also goes out to our SOC partners for their crucial licensing support.</p><h3>Tapping into Third-Party Intelligence Tools</h3><ul><li><a href="https://apivoid.com/">APIVoid</a></li><li><a href="https://av.alienvault.com/">AlienVault OTX Cyber ⁣Crime Tracker</a></li><li><a href="https://safebrowsing.google.com/">Google Safe Browsing </a></li><li><a href="https://www.ibm.com/security/xforce">IBM X-Force Exchange </a></li><li>Pulse Dive </li><li><a href="https://www.recordedfuture.com/">Recorded ⁤Future </a></li] <li><a href="http://shodan.io">Shodan </a></ li ><li>< a h ref = " https : // www . virustotal . com / " > Virus Total Alpha Mountain Threat Intelligence < / a >< / li ><br>< / ul ></p><h4>Your Feedback Matters!</h4><p class="has-text-align-center">We invite you to share ⁣your thoughts! Feel free&#x200d; to drop your questions or comments below while staying connected ⁢through Cisco Secure&#8217;s social media channels!</p><div class="has-text-align-center"><p>Cisco Social Media Links:‌<br> Instagram | Facebook |<br><a target="_blank" rel="noopener noreferrer" href="https://twitter.com/CiscoSecure">Twitter</a>| LinkedIn<br> ‌ </p><p>&#8211;><br> ))}<br><script async src="//platform.twitter.com/widgets.js" charset='utf-8'></script>>;<br><script async src="//www.instagram.com/embed.js"></script>&#8216;;</p><div class="jeg_ad jeg_ad_article jnews_content_inline_2_ads "><div class='ads-wrapper align-center '><div class='ads_code'><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2981589841512911" crossorigin="anonymous"></script><ins class="adsbygoogle" style="display:inline-block;width:728px;height:90px" data-ad-client="ca-pub-2981589841512911" data-ad-slot="6094883588"></ins><script> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div><div class='ads-text'>ADVERTISEMENT</div></div></div><div class="jeg_post_tags"><span>Tags:</span><a href="https://tech-news.info/tag/cisco/" rel="tag">Cisco</a><a href="https://tech-news.info/tag/cisco-live/" rel="tag">Cisco Live</a><a href="https://tech-news.info/tag/cybersecurity/" rel="tag">Cybersecurity</a><a href="https://tech-news.info/tag/event-recap/" rel="tag">event recap</a><a href="https://tech-news.info/tag/highlights/" rel="tag">highlights</a><a href="https://tech-news.info/tag/insights/" rel="tag">Insights</a><a href="https://tech-news.info/tag/it-security/" rel="tag">IT Security</a><a href="https://tech-news.info/tag/live/" rel="tag">live</a><a href="https://tech-news.info/tag/melbourne/" rel="tag">Melbourne</a><a href="https://tech-news.info/tag/networking/" rel="tag">Networking</a><a href="https://tech-news.info/tag/report/" rel="tag">Report</a><a href="https://tech-news.info/tag/soc/" rel="tag">SoC</a><a href="https://tech-news.info/tag/soc-report/" rel="tag">SOC Report</a><a href="https://tech-news.info/tag/technology-conference/" rel="tag">Technology Conference</a></div></div></div><div class="jeg_share_bottom_container"></div><div class="jeg_ad jeg_article jnews_content_bottom_ads "><div class='ads-wrapper '><div class='ads_code'><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2981589841512911" crossorigin="anonymous"></script><ins class="adsbygoogle" style="display:inline-block;width:728px;height:90px" data-ad-client="ca-pub-2981589841512911" data-ad-slot="6094883588"></ins><script> (adsbygoogle = window.adsbygoogle || []).push({}); </script><br><b>Denial of responsibility!</b><b><a href="https://tech-news.info/">tech-news.info</a></b> is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – <b><a href="mailto:abuse@tech-news.info" title="abuse@tech-news.info">abuse@tech-news.info</a></b>. The content will be deleted within 24 hours.</div></div></div><div class="jnews_prev_next_container"><div class="jeg_prevnext_post"><a href="https://tech-news.info/unveiling-the-truth-why-do-some-google-play-store-games-deceive-with-misleading-ads-phandroid/" class="post prev-post"><span class="caption">Previous Post</span><h3 class="post-title">Unveiling the Truth: Why Do Some Google Play Store Games Deceive with Misleading Ads?&#8221; &#8211; Phandroid</h3></a><a href="https://tech-news.info/you-com-launches-groundbreaking-ai-research-agent-that-analyzes-over-400-sources-simultaneously/" class="post next-post"><span class="caption">Next Post</span><h3 class="post-title">You.com Launches Groundbreaking AI Research Agent That Analyzes Over 400 Sources Simultaneously!</h3></a></div></div><div class="jnews_author_box_container "></div><div class="jnews_related_post_container"><div class="jeg_postblock_15 jeg_postblock jeg_module_hook jeg_pagination_disable jeg_col_2o3 jnews_module_253112_0_67c0762d34cb2 " data-unique="jnews_module_253112_0_67c0762d34cb2"><div class="jeg_block_heading jeg_block_heading_6 jeg_subcat_right"><h3 class="jeg_block_title"><span>Related<strong>Posts</strong></span></h3></div><div class="jeg_block_container"><div class="jeg_posts_wrap"><div class="jeg_posts jeg_load_more_flag"><article class="jeg_post jeg_pl_md_box format-standard"><div class="box_wrap"><div class="jeg_thumb"><a href="https://tech-news.info/discover-the-best-idps-solutions-from-powerful-open-source-gems-to-premier-enterprise-grade-heroes/"><div class="thumbnail-container animate-lazy size-715 "><img width="350" height="250" src="https://tech-news.info/wp-content/themes/jnews/assets/img/jeg-empty.png" class="attachment-jnews-350x250 size-jnews-350x250 lazyload wp-post-image" alt="Discover the Best IDPS Solutions: From Powerful Open-Source Gems to Premier Enterprise-Grade Heroes!" title="Discover the Best IDPS Solutions: From Powerful Open-Source Gems to Premier Enterprise-Grade Heroes!" decoding="async" loading="lazy" data-src="https://i0.wp.com/cloudtweaks.com/wp-content/uploads/2025/02/fortinet.com_.jpg?w=350&amp;resize=350,250&amp;ssl=1" data-srcset="" data-sizes="auto" data-expand="700"/></div></a><div class="jeg_post_category"><span><a href="https://tech-news.info/cat/cloud-computing/" class="category-cloud-computing">Cloud Computing</a></span></div></div><div class="jeg_postblock_content"><h3 class="jeg_post_title"><a href="https://tech-news.info/discover-the-best-idps-solutions-from-powerful-open-source-gems-to-premier-enterprise-grade-heroes/">Discover the Best IDPS Solutions: From Powerful Open-Source Gems to Premier Enterprise-Grade Heroes!</a></h3><div class="jeg_post_meta"><div class="jeg_meta_date"><a href="https://tech-news.info/discover-the-best-idps-solutions-from-powerful-open-source-gems-to-premier-enterprise-grade-heroes/"><i class="fa fa-clock-o"></i> February 27, 2025</a></div></div></div></div></article><article class="jeg_post jeg_pl_md_box format-standard"><div class="box_wrap"><div class="jeg_thumb"><a href="https://tech-news.info/unlocking-the-future-your-essential-guide-to-ai-powered-connectivity/"><div class="thumbnail-container animate-lazy size-715 "><img width="350" height="250" src="https://tech-news.info/wp-content/themes/jnews/assets/img/jeg-empty.png" class="attachment-jnews-350x250 size-jnews-350x250 lazyload wp-post-image" alt="Unlocking the Future: Your Essential Guide to AI-Powered Connectivity" title="Unlocking the Future: Your Essential Guide to AI-Powered Connectivity" decoding="async" loading="lazy" data-src="https://i1.wp.com/storage.googleapis.com/blogs-images-new/ciscoblogs/1/2025/02/building-blocks-api-driven-networks-1024x308.png?w=350&amp;resize=350,250&amp;ssl=1" data-srcset="" data-sizes="auto" data-expand="700"/></div></a><div class="jeg_post_category"><span><a href="https://tech-news.info/cat/cloud-computing/" class="category-cloud-computing">Cloud Computing</a></span></div></div><div class="jeg_postblock_content"><h3 class="jeg_post_title"><a href="https://tech-news.info/unlocking-the-future-your-essential-guide-to-ai-powered-connectivity/">Unlocking the Future: Your Essential Guide to AI-Powered Connectivity</a></h3><div class="jeg_post_meta"><div class="jeg_meta_date"><a href="https://tech-news.info/unlocking-the-future-your-essential-guide-to-ai-powered-connectivity/"><i class="fa fa-clock-o"></i> February 25, 2025</a></div></div></div></div></article><article class="jeg_post jeg_pl_md_box format-standard"><div class="box_wrap"><div class="jeg_thumb"><a href="https://tech-news.info/unlocking-fulfillment-how-giving-back-transforms-work-life-and-purpose/"><div class="thumbnail-container animate-lazy size-715 "><img width="350" height="250" src="https://tech-news.info/wp-content/themes/jnews/assets/img/jeg-empty.png" class="attachment-jnews-350x250 size-jnews-350x250 lazyload wp-post-image" alt="Unlocking Fulfillment: How Giving Back Transforms Work, Life, and Purpose" title="Unlocking Fulfillment: How Giving Back Transforms Work, Life, and Purpose" decoding="async" loading="lazy" data-src="https://i1.wp.com/storage.googleapis.com/blogs-images-new/ciscoblogs/1/2025/02/20210315_154418520_iOS.jpg?w=350&amp;resize=350,250&amp;ssl=1" data-srcset="" data-sizes="auto" data-expand="700"/></div></a><div class="jeg_post_category"><span><a href="https://tech-news.info/cat/cloud-computing/" class="category-cloud-computing">Cloud Computing</a></span></div></div><div class="jeg_postblock_content"><h3 class="jeg_post_title"><a href="https://tech-news.info/unlocking-fulfillment-how-giving-back-transforms-work-life-and-purpose/">Unlocking Fulfillment: How Giving Back Transforms Work, Life, and Purpose</a></h3><div class="jeg_post_meta"><div class="jeg_meta_date"><a href="https://tech-news.info/unlocking-fulfillment-how-giving-back-transforms-work-life-and-purpose/"><i class="fa fa-clock-o"></i> February 25, 2025</a></div></div></div></div></article><article class="jeg_post jeg_pl_md_box format-standard"><div class="box_wrap"><div class="jeg_thumb"><a href="https://tech-news.info/empower-your-cyber-defense-unleashing-the-power-of-threat-intelligence-platforms/"><div class="thumbnail-container animate-lazy size-715 "><img width="350" height="250" src="https://tech-news.info/wp-content/themes/jnews/assets/img/jeg-empty.png" class="attachment-jnews-350x250 size-jnews-350x250 lazyload wp-post-image" alt="Empower Your Cyber Defense: Unleashing the Power of Threat Intelligence Platforms" title="Empower Your Cyber Defense: Unleashing the Power of Threat Intelligence Platforms" decoding="async" loading="lazy" data-src="https://i3.wp.com/cloudtweaks.com/wp-content/uploads/2025/02/Threat-connect.jpg?w=350&amp;resize=350,250&amp;ssl=1" data-srcset="" data-sizes="auto" data-expand="700"/></div></a><div class="jeg_post_category"><span><a href="https://tech-news.info/cat/cloud-computing/" class="category-cloud-computing">Cloud Computing</a></span></div></div><div class="jeg_postblock_content"><h3 class="jeg_post_title"><a href="https://tech-news.info/empower-your-cyber-defense-unleashing-the-power-of-threat-intelligence-platforms/">Empower Your Cyber Defense: Unleashing the Power of Threat Intelligence Platforms</a></h3><div class="jeg_post_meta"><div class="jeg_meta_date"><a href="https://tech-news.info/empower-your-cyber-defense-unleashing-the-power-of-threat-intelligence-platforms/"><i class="fa fa-clock-o"></i> February 25, 2025</a></div></div></div></div></article></div></div><div class='module-overlay'><div class='preloader_type preloader_dot'><div class="module-preloader jeg_preloader dot"><span></span><span></span><span></span></div><div class="module-preloader jeg_preloader circle"><div class="jnews_preloader_circle_outer"><div class="jnews_preloader_circle_inner"></div></div></div><div class="module-preloader jeg_preloader square"><div class="jeg_square"><div class="jeg_square_inner"></div></div></div></div></div></div><div class="jeg_block_navigation"><div class='navigation_overlay'><div class='module-preloader jeg_preloader'><span></span><span></span><span></span></div></div></div><script>var jnews_module_253112_0_67c0762d34cb2 = {"header_icon":"","first_title":"Related","second_title":"Posts","url":"","header_type":"heading_6","header_background":"","header_secondary_background":"","header_text_color":"","header_line_color":"","header_accent_color":"","header_filter_category":"","header_filter_author":"","header_filter_tag":"","header_filter_text":"All","post_type":"post","content_type":"all","number_post":"4","post_offset":0,"unique_content":"disable","include_post":"","exclude_post":253112,"include_category":"12294","exclude_category":"","include_author":"","include_tag":"","exclude_tag":"","sort_by":"latest","date_format":"default","date_format_custom":"Y\/m\/d","force_normal_image_load":"","pagination_mode":"disable","pagination_nextprev_showtext":"","pagination_number_post":"4","pagination_scroll_limit":3,"el_id":"","el_class":"","scheme":"","column_width":"auto","title_color":"","accent_color":"","alt_color":"","excerpt_color":"","css":"","excerpt_length":20,"paged":1,"column_class":"jeg_col_2o3","class":"jnews_block_15"};</script></div></div><div class="jnews_popup_post_container"></div><div class="jnews_comment_container"></div></div></div><div class="jeg_sidebar jeg_sticky_sidebar col-md-4"><div class="jegStickyHolder"><div class="theiaStickySidebar"><div class="widget widget_jnews_module_element_ads" id="jnews_module_element_ads-1"><div class='jeg_ad jeg_ad_module jnews_module_253112_1_67c0762d3727a '><div class='ads-wrapper'><div class=''><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2981589841512911" crossorigin="anonymous"></script><ins class="adsbygoogle" style="display:inline-block;width:300px;height:250px" data-ad-client="ca-pub-2981589841512911" data-ad-slot="9187950788"></ins><script> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div><div class='ads-text'>ADVERTISEMENT</div></div></div></div><div class="widget widget_jnews_module_block_20" id="jnews_module_block_20-2"><div class="jeg_postblock_20 jeg_postblock jeg_module_hook jeg_pagination_disable jeg_col_1o3 jnews_module_253112_2_67c0762d3776c normal " data-unique="jnews_module_253112_2_67c0762d3776c"><div class="jeg_block_container"><div class="jeg_posts"><article class="jeg_post jeg_pl_sm format-standard"><div class="jeg_thumb"><a href="https://tech-news.info/iphone-17-pro-buzz-analyst-hints-at-12gb-ram-upgrade-for-ultimate-performance/"><div class="thumbnail-container animate-lazy size-715 "><img width="120" height="86" src="https://tech-news.info/wp-content/themes/jnews/assets/img/jeg-empty.png" class="attachment-jnews-120x86 size-jnews-120x86 lazyload wp-post-image" alt="IPhone 17 Pro Buzz: Analyst Hints at 12GB RAM Upgrade for Ultimate Performance!" title="IPhone 17 Pro Buzz: Analyst Hints at 12GB RAM Upgrade for Ultimate Performance!" decoding="async" loading="lazy" data-src="https://i2.wp.com/images.macrumors.com/t/8b9FPS_AVmyeFB7EcvcswG2CxNw=/400x0/article-new/2025/02/iphone-17-pro-asherdipps.jpg?lossy&amp;w=120&amp;resize=120,86&amp;ssl=1" data-srcset="" data-sizes="auto" data-expand="700"/></div></a></div><div class="jeg_postblock_content"><h3 class="jeg_post_title"><a href="https://tech-news.info/iphone-17-pro-buzz-analyst-hints-at-12gb-ram-upgrade-for-ultimate-performance/">IPhone 17 Pro Buzz: Analyst Hints at 12GB RAM Upgrade for Ultimate Performance!</a></h3><div class="jeg_post_meta"><div class="jeg_meta_date"><a href="https://tech-news.info/iphone-17-pro-buzz-analyst-hints-at-12gb-ram-upgrade-for-ultimate-performance/"><i class="fa fa-clock-o"></i> February 27, 2025</a></div></div></div></article><div class="jeg_postsmall jeg_load_more_flag"><article class="jeg_post jeg_pl_xs format-standard"><div class="jeg_postblock_content"><h3 class="jeg_post_title"><a href="https://tech-news.info/game-changer-researchers-unveil-innovative-silicon-free-solar-panel/">Game-Changer: Researchers Unveil Innovative Silicon-Free Solar Panel!</a></h3><div class="jeg_post_meta"><div class="jeg_meta_date"><a href="https://tech-news.info/game-changer-researchers-unveil-innovative-silicon-free-solar-panel/"><i class="fa fa-clock-o"></i> February 27, 2025</a></div></div></div></article><article class="jeg_post jeg_pl_xs format-standard"><div class="jeg_postblock_content"><h3 class="jeg_post_title"><a href="https://tech-news.info/dont-miss-out-your-ultimate-guide-to-the-exciting-global-launch-of-the-xiaomi-15-ultra/">Don’t Miss Out: Your Ultimate Guide to the Exciting Global Launch of the Xiaomi 15 Ultra!</a></h3><div class="jeg_post_meta"><div class="jeg_meta_date"><a href="https://tech-news.info/dont-miss-out-your-ultimate-guide-to-the-exciting-global-launch-of-the-xiaomi-15-ultra/"><i class="fa fa-clock-o"></i> February 27, 2025</a></div></div></div></article><article class="jeg_post jeg_pl_xs format-standard"><div class="jeg_postblock_content"><h3 class="jeg_post_title"><a href="https://tech-news.info/unveiling-the-future-all-the-exciting-announcements-from-amazons-alexa-ai-event/">Unveiling the Future: All the Exciting Announcements from Amazon&#8217;s Alexa+ AI Event!</a></h3><div class="jeg_post_meta"><div class="jeg_meta_date"><a href="https://tech-news.info/unveiling-the-future-all-the-exciting-announcements-from-amazons-alexa-ai-event/"><i class="fa fa-clock-o"></i> February 27, 2025</a></div></div></div></article><article class="jeg_post jeg_pl_xs format-standard"><div class="jeg_postblock_content"><h3 class="jeg_post_title"><a href="https://tech-news.info/unleashing-power-in-your-pocket-a-deep-dive-into-the-ugreen-100w-gan-mini-magsafe-power-station/">Unleashing Power in Your Pocket: A Deep Dive into the Ugreen 100W GaN Mini MagSafe Power Station</a></h3><div class="jeg_post_meta"><div class="jeg_meta_date"><a href="https://tech-news.info/unleashing-power-in-your-pocket-a-deep-dive-into-the-ugreen-100w-gan-mini-magsafe-power-station/"><i class="fa fa-clock-o"></i> February 27, 2025</a></div></div></div></article><article class="jeg_post jeg_pl_xs format-standard"><div class="jeg_postblock_content"><h3 class="jeg_post_title"><a href="https://tech-news.info/solar-showdown-arizona-advocates-take-on-apss-controversial-grid-access-charge-in-court-for-fair-energy-rights/">Solar Showdown: Arizona Advocates Take on APS&#8217;s Controversial &#8216;Grid Access Charge&#8217; in Court for Fair Energy Rights!</a></h3><div class="jeg_post_meta"><div class="jeg_meta_date"><a href="https://tech-news.info/solar-showdown-arizona-advocates-take-on-apss-controversial-grid-access-charge-in-court-for-fair-energy-rights/"><i class="fa fa-clock-o"></i> February 27, 2025</a></div></div></div></article><article class="jeg_post jeg_pl_xs format-standard"><div class="jeg_postblock_content"><h3 class="jeg_post_title"><a href="https://tech-news.info/spotify-sparks-controversy-accuses-apple-of-falling-short-on-dma-compliance/">Spotify Sparks Controversy: Accuses Apple of Falling Short on DMA Compliance!</a></h3><div class="jeg_post_meta"><div class="jeg_meta_date"><a href="https://tech-news.info/spotify-sparks-controversy-accuses-apple-of-falling-short-on-dma-compliance/"><i class="fa fa-clock-o"></i> February 27, 2025</a></div></div></div></article><article class="jeg_post jeg_pl_xs format-standard"><div class="jeg_postblock_content"><h3 class="jeg_post_title"><a href="https://tech-news.info/iphone-16e-vs-iphone-se-should-you-make-the-leap-to-upgrade-now/">IPhone 16e vs iPhone SE: Should You Make the Leap to Upgrade Now</a></h3><div class="jeg_post_meta"><div class="jeg_meta_date"><a href="https://tech-news.info/iphone-16e-vs-iphone-se-should-you-make-the-leap-to-upgrade-now/"><i class="fa fa-clock-o"></i> February 27, 2025</a></div></div></div></article><article class="jeg_post jeg_pl_xs format-standard"><div class="jeg_postblock_content"><h3 class="jeg_post_title"><a href="https://tech-news.info/unlocking-precision-elevenlabs-launches-scribe-the-most-accurate-speech-to-text-model-yet-with-a-stunning-96-7-accuracy-in-english/">Unlocking Precision: ElevenLabs Launches Scribe – The Most Accurate Speech-to-Text Model Yet with a Stunning 96.7% Accuracy in English!</a></h3><div class="jeg_post_meta"><div class="jeg_meta_date"><a href="https://tech-news.info/unlocking-precision-elevenlabs-launches-scribe-the-most-accurate-speech-to-text-model-yet-with-a-stunning-96-7-accuracy-in-english/"><i class="fa fa-clock-o"></i> February 27, 2025</a></div></div></div></article><article class="jeg_post jeg_pl_xs format-standard"><div class="jeg_postblock_content"><h3 class="jeg_post_title"><a href="https://tech-news.info/capture-every-detail-realmes-ultra-phone-to-feature-groundbreaking-1-sensor-and-10x-optical-zoom-with-stunning-camera-samples-revealed/">Capture Every Detail: Realme&#8217;s Ultra Phone to Feature Groundbreaking 1&#8243; Sensor and 10x Optical Zoom, with Stunning Camera Samples Revealed!</a></h3><div class="jeg_post_meta"><div class="jeg_meta_date"><a href="https://tech-news.info/capture-every-detail-realmes-ultra-phone-to-feature-groundbreaking-1-sensor-and-10x-optical-zoom-with-stunning-camera-samples-revealed/"><i class="fa fa-clock-o"></i> February 27, 2025</a></div></div></div></article></div></div><div class='module-overlay'><div class='preloader_type preloader_dot'><div class="module-preloader jeg_preloader dot"><span></span><span></span><span></span></div><div class="module-preloader jeg_preloader circle"><div class="jnews_preloader_circle_outer"><div class="jnews_preloader_circle_inner"></div></div></div><div class="module-preloader jeg_preloader square"><div class="jeg_square"><div class="jeg_square_inner"></div></div></div></div></div></div><div class="jeg_block_navigation"><div class='navigation_overlay'><div class='module-preloader jeg_preloader'><span></span><span></span><span></span></div></div></div><script>var jnews_module_253112_2_67c0762d3776c = {"header_icon":"","first_title":"","second_title":"","url":"","header_type":"heading_6","header_background":"","header_secondary_background":"","header_text_color":"","header_line_color":"","header_accent_color":"","header_filter_category":"","header_filter_author":"","header_filter_tag":"","header_filter_text":"All","post_type":"post","content_type":"all","number_post":"10","post_offset":"0","unique_content":"disable","include_post":"","exclude_post":"","include_category":"","exclude_category":"","include_author":"","include_tag":"","exclude_tag":"","sort_by":"latest","date_format":"default","date_format_custom":"Y\/m\/d","force_normal_image_load":"0","pagination_mode":"disable","pagination_nextprev_showtext":"0","pagination_number_post":"6","pagination_scroll_limit":"0","boxed":"0","boxed_shadow":"0","el_id":"","el_class":"","scheme":"normal","column_width":"auto","title_color":"","accent_color":"","alt_color":"","excerpt_color":"","css":"","paged":1,"column_class":"jeg_col_1o3","class":"jnews_block_20"};</script></div></div><div class="widget widget_categories" id="categories-5"><div class="jeg_block_heading jeg_block_heading_6 jnews_67c0762d38de8"><h3 class="jeg_block_title"><span>Categories</span></h3></div><form action="https://tech-news.info" method="get"><label class="screen-reader-text" for="cat">Categories</label><select name='cat' id='cat' class='postform'><option value='-1'>Select Category</option><option class="level-0" value="12296">Android&nbsp;&nbsp;(1,477)</option><option class="level-0" value="12295">Apple&nbsp;&nbsp;(1,637)</option><option class="level-0" value="8">Blockchain&nbsp;&nbsp;(50)</option><option class="level-0" value="12294">Cloud Computing&nbsp;&nbsp;(79)</option><option class="level-0" value="12288">Green Technology&nbsp;&nbsp;(1,209)</option><option class="level-0" value="1">Tech News&nbsp;&nbsp;(1,181)</option></select></form><script type="text/javascript"> /* <![CDATA[ */ (function() { var dropdown = document.getElementById( "cat" ); function onCatChange() { if ( dropdown.options[ dropdown.selectedIndex ].value > 0 ) { dropdown.parentNode.submit(); } } dropdown.onchange = onCatChange; })(); /* ]]> */ </script></div><div class="widget widget_archive" id="archives-3"><div class="jeg_block_heading jeg_block_heading_6 jnews_67c0762d38fff"><h3 class="jeg_block_title"><span>Archives</span></h3></div><label class="screen-reader-text" for="archives-dropdown-3">Archives</label><select id="archives-dropdown-3" name="archive-dropdown"><option value="">Select Month</option><option value='https://tech-news.info/2025/02/'> February 2025 &nbsp;(1892)</option><option value='https://tech-news.info/2025/01/'> January 2025 &nbsp;(2185)</option><option value='https://tech-news.info/2024/12/'> December 2024 &nbsp;(1277)</option><option value='https://tech-news.info/2024/09/'> September 2024 &nbsp;(42)</option><option value='https://tech-news.info/2024/08/'> August 2024 &nbsp;(187)</option></select><script type="text/javascript"> /* <![CDATA[ */ (function() { var dropdown = document.getElementById( "archives-dropdown-3" ); function onSelectChange() { if ( dropdown.options[ dropdown.selectedIndex ].value !== '' ) { document.location.href = this.options[ this.selectedIndex ].value; } } dropdown.onchange = onSelectChange; })(); /* ]]> */ </script></div><div class="widget widget_calendar" id="calendar-2"><div id="calendar_wrap" class="calendar_wrap"><table id="wp-calendar" class="wp-calendar-table"><caption>February 2025</caption><thead><tr><th scope="col" title="Monday">M</th><th scope="col" title="Tuesday">T</th><th scope="col" title="Wednesday">W</th><th scope="col" title="Thursday">T</th><th scope="col" title="Friday">F</th><th scope="col" title="Saturday">S</th><th scope="col" title="Sunday">S</th></tr></thead><tbody><tr><td colspan="5" class="pad">&nbsp;</td><td><a href="https://tech-news.info/2025/02/01/" aria-label="Posts published on February 1, 2025">1</a></td><td><a href="https://tech-news.info/2025/02/02/" aria-label="Posts published on February 2, 2025">2</a></td></tr><tr><td><a href="https://tech-news.info/2025/02/03/" aria-label="Posts published on February 3, 2025">3</a></td><td><a href="https://tech-news.info/2025/02/04/" aria-label="Posts published on February 4, 2025">4</a></td><td><a href="https://tech-news.info/2025/02/05/" aria-label="Posts published on February 5, 2025">5</a></td><td><a href="https://tech-news.info/2025/02/06/" aria-label="Posts published on February 6, 2025">6</a></td><td><a href="https://tech-news.info/2025/02/07/" aria-label="Posts published on February 7, 2025">7</a></td><td><a href="https://tech-news.info/2025/02/08/" aria-label="Posts published on February 8, 2025">8</a></td><td><a href="https://tech-news.info/2025/02/09/" aria-label="Posts published on February 9, 2025">9</a></td></tr><tr><td><a href="https://tech-news.info/2025/02/10/" aria-label="Posts published on February 10, 2025">10</a></td><td><a href="https://tech-news.info/2025/02/11/" aria-label="Posts published on February 11, 2025">11</a></td><td><a href="https://tech-news.info/2025/02/12/" aria-label="Posts published on February 12, 2025">12</a></td><td><a href="https://tech-news.info/2025/02/13/" aria-label="Posts published on February 13, 2025">13</a></td><td><a href="https://tech-news.info/2025/02/14/" aria-label="Posts published on February 14, 2025">14</a></td><td><a href="https://tech-news.info/2025/02/15/" aria-label="Posts published on February 15, 2025">15</a></td><td><a href="https://tech-news.info/2025/02/16/" aria-label="Posts published on February 16, 2025">16</a></td></tr><tr><td><a href="https://tech-news.info/2025/02/17/" aria-label="Posts published on February 17, 2025">17</a></td><td><a href="https://tech-news.info/2025/02/18/" aria-label="Posts published on February 18, 2025">18</a></td><td><a href="https://tech-news.info/2025/02/19/" aria-label="Posts published on February 19, 2025">19</a></td><td><a href="https://tech-news.info/2025/02/20/" aria-label="Posts published on February 20, 2025">20</a></td><td><a href="https://tech-news.info/2025/02/21/" aria-label="Posts published on February 21, 2025">21</a></td><td><a href="https://tech-news.info/2025/02/22/" aria-label="Posts published on February 22, 2025">22</a></td><td><a href="https://tech-news.info/2025/02/23/" aria-label="Posts published on February 23, 2025">23</a></td></tr><tr><td><a href="https://tech-news.info/2025/02/24/" aria-label="Posts published on February 24, 2025">24</a></td><td><a href="https://tech-news.info/2025/02/25/" aria-label="Posts published on February 25, 2025">25</a></td><td><a href="https://tech-news.info/2025/02/26/" aria-label="Posts published on February 26, 2025">26</a></td><td id="today"><a href="https://tech-news.info/2025/02/27/" aria-label="Posts published on February 27, 2025">27</a></td><td>28</td><td class="pad" colspan="2">&nbsp;</td></tr></tbody></table><nav aria-label="Previous and next months" class="wp-calendar-nav"><span class="wp-calendar-nav-prev"><a href="https://tech-news.info/2025/01/">&laquo; Jan</a></span><span class="pad">&nbsp;</span><span class="wp-calendar-nav-next">&nbsp;</span></nav></div></div></div></div></div></div><div class="jeg_ad jeg_article jnews_article_bottom_ads"><div class='ads-wrapper '></div></div></div></div></div></div><div id="post-body-class" class="post-template-default single single-post postid-253112 single-format-standard wp-embed-responsive jeg_toggle_light jeg_single_tpl_5 jeg_force_fs jnews jsc_normal wpb-js-composer js-comp-ver-7.6 vc_responsive"></div></div><div class="post-ajax-overlay"><div class="preloader_type preloader_dot"><div class="newsfeed_preloader jeg_preloader dot"><span></span><span></span><span></span></div><div class="newsfeed_preloader jeg_preloader circle"><div class="jnews_preloader_circle_outer"><div class="jnews_preloader_circle_inner"></div></div></div><div class="newsfeed_preloader jeg_preloader square"><div class="jeg_square"><div class="jeg_square_inner"></div></div></div></div></div></div><div class="footer-holder" id="footer" data-id="footer"><div class="jeg_footer jeg_footer_2 normal"><div class="jeg_footer_container jeg_container"><div class="jeg_footer_content"><div class="container"><div class="row"><div class="jeg_footer_primary clearfix"><div class="col-lg-4 col-md-3 footer_column"></div><div class="col-md-3 footer_column"></div><div class="col-lg-2 col-md-3 footer_column"></div><div class="col-md-3 footer_column"></div></div></div><div class="jeg_footer_secondary clearfix"><div class="footer_right"></div><ul class="jeg_menu_footer"><li class="page_item page-item-209075"><a href="https://tech-news.info/california-consumer-privacy-act-ccpa/">California Consumer Privacy Act (CCPA)</a></li><li class="page_item page-item-2"><a href="https://tech-news.info/contact-us/">Contact Us</a></li><li class="page_item page-item-209073"><a href="https://tech-news.info/cookie-privacy-policy/">Cookie Privacy Policy</a></li><li class="page_item page-item-209074"><a href="https://tech-news.info/dmca/">DMCA</a></li><li class="page_item page-item-209072"><a href="https://tech-news.info/privacy-policy/">Privacy Policy</a></li><li class="page_item page-item-79"><a href="https://tech-news.info/">Tech News</a></li><li class="page_item page-item-209071"><a href="https://tech-news.info/terms-of-use/">Terms of Use</a></li></ul><p class="copyright"> © 2015-2024 <a href="https://tech-news.info" title="tech-news.info">Tech-News.info</a><br><a href="//www.dmca.com/Protection/Status.aspx?ID=8c308ee8-adfc-4b48-ae17-58bd3232a51f" title="DMCA.com Protection Status" class="dmca-badge"><img src="https://images.dmca.com/Badges/dmca-badge-w100-5x1-08.png?ID=8c308ee8-adfc-4b48-ae17-58bd3232a51f" alt="DMCA.com Protection Status"/></a></p></div></div></div></div></div></div><div class="jscroll-to-top"><a href="#back-to-top" class="jscroll-to-top_link"><i class="fa fa-angle-up"></i></a></div></div><div id="jeg_off_canvas" class="normal"><a href="#" class="jeg_menu_close"><i class="jegicon-cross"></i></a><div class="jeg_bg_overlay"></div><div class="jeg_mobile_wrapper"><div class="nav_wrap"><div class="item_main"><div class="jeg_aside_item jeg_search_wrapper jeg_search_no_expand square"><a href="#" class="jeg_search_toggle"><i class="fa fa-search"></i></a><form action="https://tech-news.info/" method="get" class="jeg_search_form" target="_top"><input name="s" class="jeg_search_input" placeholder="Search..." type="text" value="" autocomplete="off"><button aria-label="Search Button" type="submit" class="jeg_search_button btn"><i class="fa fa-search"></i></button></form><div class="jeg_search_result jeg_search_hide with_result"><div class="search-result-wrapper"></div><div class="search-link search-noresult"> No Result </div><div class="search-link search-all-button"><i class="fa fa-search"></i> View All Result </div></div></div><div class="jeg_aside_item"><ul class="jeg_mobile_menu"><li class="page_item page-item-209075"><a href="https://tech-news.info/california-consumer-privacy-act-ccpa/">California Consumer Privacy Act (CCPA)</a></li><li class="page_item page-item-2"><a href="https://tech-news.info/contact-us/">Contact Us</a></li><li class="page_item page-item-209073"><a href="https://tech-news.info/cookie-privacy-policy/">Cookie Privacy Policy</a></li><li class="page_item page-item-209074"><a href="https://tech-news.info/dmca/">DMCA</a></li><li class="page_item page-item-209072"><a href="https://tech-news.info/privacy-policy/">Privacy Policy</a></li><li class="page_item page-item-79"><a href="https://tech-news.info/">Tech News</a></li><li class="page_item page-item-209071"><a href="https://tech-news.info/terms-of-use/">Terms of Use</a></li></ul></div></div><div class="item_bottom"><div class="jeg_aside_item socials_widget nobg"><a href="http://facebook.com" target='_blank' rel='external noopener nofollow' class="jeg_facebook"><i class="fa fa-facebook"></i></a><a href="http://twitter.com" target='_blank' rel='external noopener nofollow' class="jeg_twitter"><i class="fa fa-twitter"></i></a><a href="http://plus.google.com" target='_blank' rel='external noopener nofollow' class="jeg_google-plus removed"><i class="fa fa-google-plus"></i></a><a href="http://pinterest.com" target='_blank' rel='external noopener nofollow' class="jeg_pinterest"><i class="fa fa-pinterest"></i></a><a href="#" target='_blank' rel='external noopener nofollow' class="jeg_rss"><i class="fa fa-rss"></i></a></div><div class="jeg_aside_item jeg_aside_copyright"><p>© 2015-2024 <a href="https://tech-news.info" title="tech-news.info">Tech-News.info</a><br><a href="//www.dmca.com/Protection/Status.aspx?ID=8c308ee8-adfc-4b48-ae17-58bd3232a51f" title="DMCA.com Protection Status" class="dmca-badge"><img src="https://images.dmca.com/Badges/dmca-badge-w100-5x1-08.png?ID=8c308ee8-adfc-4b48-ae17-58bd3232a51f" alt="DMCA.com Protection Status"/></a></p></div></div></div></div></div><script type="text/javascript">var jfla = []</script><script type="text/javascript"> jQuery(function(){ var arrLiveStats=[]; var WSM_PREFIX="wsm"; jQuery(".if-js-closed").removeClass("if-js-closed").addClass("closed"); var wsmFnSiteLiveStats=function(){ jQuery.ajax({ type: "POST", url: wsm_ajaxObject.ajax_url, data: { action: 'liveSiteStats', requests: JSON.stringify(arrLiveStats), r: Math.random() } }).done(function( strResponse ) { if(strResponse!="No"){ arrResponse=JSON.parse(strResponse); jQuery.each(arrResponse, function(key,value){ $element= document.getElementById(key); oldValue=parseInt($element.getAttribute("data-value").replace(/,/g, "")); diff=parseInt(value.replace(/,/g, ""))-oldValue; $class=""; if(diff>=0){ diff="+"+diff; }else{ $class="wmcRedBack"; } $element.setAttribute("data-value",value); $element.innerHTML=diff; jQuery("#"+key).addClass($class).show().siblings(".wsmH2Number").text(value); if(key=="SiteUserOnline") { var onlineUserCnt = arrResponse.wsmSiteUserOnline; if(jQuery("#wsmSiteUserOnline").length) { jQuery("#wsmSiteUserOnline").attr("data-value",onlineUserCnt); jQuery("#wsmSiteUserOnline").next(".wsmH2Number").html("<a target=\"_blank\" href=\"?page=wsm_traffic&subPage=UsersOnline&subTab=summary\">"+onlineUserCnt+"</a>"); } } }); setTimeout(function() { jQuery.each(arrResponse, function(key,value){ jQuery("#"+key).removeClass("wmcRedBack").hide(); }); }, 1500); } }); } if(arrLiveStats.length>0){ setInterval(wsmFnSiteLiveStats, 10000); }}); </script><div id="selectShareContainer"><div class="selectShare-inner"><div class="select_share jeg_share_button"><button class="select-share-button jeg_btn-facebook" data-url="http://www.facebook.com/sharer.php?u=[url]&quote=[selected_text]" data-post-url="https%3A%2F%2Ftech-news.info%2Funveiling-insights-highlights-from-cisco-live-melbourne-soc-report%2F" data-image-url="" data-title="Unveiling%20Insights%3A%20Highlights%20from%20Cisco%20Live%20Melbourne%20SOC%20Report%21"><i class="fa fa-facebook-official"></i></a><button class="select-share-button jeg_btn-twitter" data-url="https://twitter.com/intent/tweet?text=[selected_text]&url=[url]" data-post-url="https%3A%2F%2Ftech-news.info%2Funveiling-insights-highlights-from-cisco-live-melbourne-soc-report%2F" data-image-url="" data-title="Unveiling%20Insights%3A%20Highlights%20from%20Cisco%20Live%20Melbourne%20SOC%20Report%21"><i class="fa fa-twitter"></i></a></div><div class="selectShare-arrowClip"><div class="selectShare-arrow"></div></div></div></div><div class="jnews-cookie-law-policy">This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our <a href="#">Privacy and Cookie Policy</a>. <button data-expire="7" class="btn btn-cookie">I Agree</button></div><div class="jeg_read_progress_wrapper"></div><div id="amp-mobile-version-switcher" hidden><a rel="" href="https://tech-news.info/unveiling-insights-highlights-from-cisco-live-melbourne-soc-report/?amp=1"> Go to mobile version </a></div><link rel='stylesheet' id='all-css-0' href='https://tech-news.info/wp-content/plugins/powered-cache/includes/file-optimizer.php??/wp-content/plugins/featured-image-from-url/includes/html/css/lazyload.css&minify=1' type='text/css' media='all'/><link rel='stylesheet' id='core-block-supports-duotone-css' href='https://tech-news.info/unveiling-insights-highlights-from-cisco-live-melbourne-soc-report/' media='all'/><script type="text/javascript" src="https://tech-news.info/wp-includes/js/hoverIntent.min.js" id="hoverIntent-js"></script><script type="text/javascript" src="https://tech-news.info/wp-includes/js/imagesloaded.min.js" id="imagesloaded-js"></script><script type="text/javascript" id="jnews-frontend-js-extra"> /* <![CDATA[ */ var jnewsoption = {"login_reload":"https:\/\/tech-news.info\/unveiling-insights-highlights-from-cisco-live-melbourne-soc-report","popup_script":"magnific","single_gallery":"","ismobile":"","isie":"","sidefeed_ajax":"","language":"en_US","module_prefix":"jnews_module_ajax_","live_search":"1","postid":"253112","isblog":"1","admin_bar":"0","follow_video":"","follow_position":"top_right","rtl":"0","gif":"","lang":{"invalid_recaptcha":"Invalid Recaptcha!","empty_username":"Please enter your username!","empty_email":"Please enter your email!","empty_password":"Please enter your password!"},"recaptcha":"0","site_slug":"\/","site_domain":"tech-news.info","zoom_button":"0"}; /* ]]> */ </script><script type="text/javascript" src="https://tech-news.info/wp-content/themes/jnews/assets/dist/frontend.min.js" id="jnews-frontend-js"></script><script type="text/javascript" src="https://tech-news.info/wp-includes/js/jquery/ui/core.min.js" id="jquery-ui-core-js"></script><script type="text/javascript" src="https://tech-news.info/wp-includes/js/jquery/ui/datepicker.min.js" id="jquery-ui-datepicker-js"></script><script type="text/javascript" id="jquery-ui-datepicker-js-after"> /* <![CDATA[ */ jQuery(function(jQuery){jQuery.datepicker.setDefaults({"closeText":"Close","currentText":"Today","monthNames":["January","February","March","April","May","June","July","August","September","October","November","December"],"monthNamesShort":["Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"],"nextText":"Next","prevText":"Previous","dayNames":["Sunday","Monday","Tuesday","Wednesday","Thursday","Friday","Saturday"],"dayNamesShort":["Sun","Mon","Tue","Wed","Thu","Fri","Sat"],"dayNamesMin":["S","M","T","W","T","F","S"],"dateFormat":"MM d, yy","firstDay":1,"isRTL":false});}); /* ]]> */ </script><script type="text/javascript" src="https://tech-news.info/wp-includes/js/jquery/ui/effect.min.js" id="jquery-effects-core-js"></script><script type="text/javascript" src="https://tech-news.info/wp-content/plugins/powered-cache/includes/file-optimizer.php??/wp-content/plugins/quick-contact-form/legacy/js/scripts.js&minify=1" id="qcf_script-js"></script><script type="text/javascript" id="qcf_script-js-after"> /* <![CDATA[ */ var ajaxurl = "https://tech-news.info/wp-admin/admin-ajax.php"; /* ]]> */ </script><script type="text/javascript" src="https://tech-news.info/wp-content/plugins/powered-cache/includes/file-optimizer.php??/wp-content/plugins/quick-contact-form/legacy/js/slider.js&minify=1" id="qcf_slider-js"></script><script type="text/javascript" id="jnews-select-share-js-extra"> /* <![CDATA[ */ var jnews_select_share = {"is_customize_preview":""}; /* ]]> */ </script><script type="text/javascript" src="https://tech-news.info/wp-content/plugins/powered-cache/includes/file-optimizer.php??/wp-content/plugins/jnews-social-share/assets/js/plugin.js&minify=1" id="jnews-select-share-js"></script><script type="text/javascript" id="fifu-json-ld-js-extra"> /* <![CDATA[ */ var fifuJsonLd = {"url":"https:\/\/i2.wp.com\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/Staff-468x200.png?ssl=1"}; /* ]]> */ </script><script type="text/javascript" src="https://tech-news.info/wp-content/plugins/powered-cache/includes/file-optimizer.php??/wp-content/plugins/featured-image-from-url/includes/html/js/json-ld.js&minify=1" id="fifu-json-ld-js"></script><script type="text/javascript" src="https://tech-news.info/wp-content/plugins/powered-cache/includes/file-optimizer.php??/wp-content/plugins/featured-image-from-url/includes/html/js/lazyload.js&minify=1" id="fifu-lazyload-js-js"></script><script></script><div class="jeg_ad jnews_mobile_sticky_ads "></div><script type='application/ld+json'>{"@context":"http:\/\/schema.org","@type":"TechArticle","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/tech-news.info\/unveiling-insights-highlights-from-cisco-live-melbourne-soc-report\/"},"dateCreated":"2025-02-27 09:18:38","datePublished":"2025-02-27 09:18:38","dateModified":"2025-02-27 14:19:18","url":"https:\/\/tech-news.info\/unveiling-insights-highlights-from-cisco-live-melbourne-soc-report\/","headline":"Unveiling Insights: Highlights from Cisco Live Melbourne SOC Report!","name":"Unveiling Insights: Highlights from Cisco Live Melbourne SOC Report!","articleBody":"<h1>Comprehensive Overview of Cisco Live Melbourne 2024 Security Operations<\/h1>\n\n<h2>Introduction<\/h2>\n\nFor years, Cisco has played a pivotal\u2062 role in securing high-profile events such \u2062as the Black Hat and RSA\u2062 Conferences, as well as major occurrences like the Super Bowl and the \u200bOlympics. \u200bTheir security offerings encompass \u200bvarious products\u2014including advanced capabilities from Cisco Security Cloud, such as \u2064Umbrella, XDR, Malware Analytics, and Splunk Enterprise Security\u2014and a team of proficient analysts within their Security Operations Centre (SOC). This SOC is essential for &#x200d;constructing robust infrastructures that\u2062 identify threats both internally and externally\u2063 to\u200c event networks.\n\nIn 2024,\u200c at Cisco Live APJC for the second consecutive time, our team was entrusted with providing support during the Cisco Live conference in&#x200d; Melbourne. This report outlines our experiences encompassing network design, deployment &#x200d;phases, operational strategies <a href=\"https:\/\/tech-news.info\/police-pursue-and-capture-burglary-suspects-in-high-tech-chase-benicia-pd-makes-arrests-after-napa-crime-spree\/\" title=\"Police Pursue and Capture Burglary Suspects in High-Tech Chase: Benicia PD Makes Arrests After Napa Crime Spree\">employed<\/a> throughout the event, and key findings from four \u200baction-packed days dedicated to proactive threat hunting.\n\n<h2>Insight \u2062into SOC \u2064Operations<\/h2>\n\n<h3>Secure Access Management<\/h3>\n\nThe primary function of the Cisco Live SOC is to guarantee secure access to all services presented at\u2064 various events. Attaining this objective necessitates \u200cconstant monitoring across a spectrum of tools designed to gather crucial data effectively.\n\nBy receiving diverse forms of information from networks and devices alike, our SOC can refine this influx into actionable insights that inform\u200c us about actual activities occurring within \u200cthe environment. We need concise \u2062overviews for efficient triage \u2062processes\u200b while simultaneously being equipped\u2064 for thorough investigations when necessary.\n\n<h3>Statistical Highlights <\/h3>\n\nTo illustrate the scale \u200bat which Cisco operated \u200bduring APJC 2024:\n<ul>\n<li>Total DNS Queries: <strong>48 million<\/strong>+<\/li>\n<li>Queries Sinkholed: \u200b <strong>4 thousand+<\/strong><\/li>\n<li>Applications Classified: <strong>11 thousand+<\/strong><\/li>\n<li>Risky Applications Detected: <strong>300+<\/strong><\/li>\n<li>Total Internal Traffic Volume: <strong>320 TB<\/strong><\/li>\n<li>Encrypted Traffic Volume: <strong>206\u200b TB<\/strong><\/li>\n<li>External Traffic Flow:\u2062 <strong>314 TB<\/strong><\/li>\n<li>Unique Hosts Inside Event Network: <strong>4355<\/strong><\/li>\n<li>Unique Hosts Outside Event\u2064 Network: <strong>58349<\/strong><\/li>\n<\/ul>\n\n<h2>Identifying\u2062 Business Risk Areas <\/h2>\n\n<h4>Major Components at Events:<\/h4>\n\n<ol>\n<li>Delegate Wi-Fi Access \u2013 For attendees\u2019 connectivity<\/li>\n<li>Broadcasting Services via Cisco \u2063TV \u2013 Essential media coverage<\/li>\n<li>NOC\/SOC&#x200d; Operational Support \u2013 Critical management functions <\/li>\n<li>World of Solutions Section\u2063 \u2013 Interactive demonstration zone<\/li>\n<li>Registration Zone \u2013 Managing entry\u2063 protocols \u2064safely<\/li>\n<\/ol>\n\n<h2>Strategic Preparation Initiatives <\/h2>\n\n<strong>\u201cEquipping Everyone with Appropriate Tools\u201d<\/strong>\n\nPreparation commenced weeks in advance leading up to event day\u2014a process \u2064characterized\u2063 by extensive planning \u2063across multiple areas including \u200cstaffing\u200c logistics; floor space organization; cloud service establishment; equipment shipping schedules; marketing coordination; tour registration systems; escalation pathways with NOC \u200cstaff\u2014alongside critical lessons harvested from prior events impacting shift management and credentialing systems.\n\n<h3>Team Structure & Staffing Efforts <\/h3>\n\nWe implemented round-the-clock coverage consisting of two shifts spanning fourteen \u200chours\u2062 each day\u2014from 8 AM through 6 PM\u2014ensuring vigilant supervision throughout operations.\n\nOur structure featured four primary \u200bstations focusing on:\n<ol>\n<li>Triage Management <\/li>\n<li>Sandbox\u2062 Environment<\/li>\n<li>Event &#x200d;Logging <\/li>\n<li>SIEM\/Forensics tasks <\/li>\n<\/ol>\n\n\n\n\n\n\n\nStaff rotated among these stations while additional team members undertook threat hunting responsibilities alongside automation initiatives aimed toward enhancing responsiveness.\n\nBoth experienced analysts and interns collaborated closely aside each other sharing knowledge akin to trading cards amidst a nurturing atmosphere fostering camaraderie among&#x200d; participants eager to learn collaboratively while maintaining security diligence usability assessments beneficial not only for attendees but also providing constructive feedback\u2062 loops vital for development improvements related directly back into platforms being utilized!\n\n<h3>Team Highlights<\/h3>\n\nLeading Analysts:\n - Christian Clasen\n -&#x200d; Justin Murphy\n - Aditya Raghavan\n - Adam Kilgore \u2062 \n - Tony Iacobelli \n - Jessica Oppenheimer \n\nIntern&#x200d; Analysts:\n - Cam Dunn \n\u2063 - Milin Mistry \n - Ricky Mok \u200c\n - Zoltan Karczag \n&#x200d; - Alex \u2064Chan \n\nSOC Leadership:\n <em> Shaun Coulter \n <\/em> \u200bAditya Sankar \u200c \u2062 \n <em> &#x200d;Ryan MacLennan \n\nNOC Leadership:\n <\/em> Freddy Bello \u2062 \n * Andy\u2064 Phillips \n\n<h2>Engaging SOC Tours <\/h2>\n\nDuring this conference timeframe we facilitated fourteen informative &#x200d;tours showcasing our operations which saw participation exceeding 140 individuals eager learning firsthand about our processes\u2014including interesting discoveries &#x200d;related experience operating security tools amidst real-time settings!\n\nThese presentations\u2064 served adeptly capturing audiences' attention revolving \u2063insights accumulated enriching overall community understanding regarding cybersecurity \u200bbest &#x200d;practices rendering safety vital future&#x200d; advancements thus fostering continuous discourse emerging modern technology landscapes tackling cyber threats effectively!\n\nThe remainder this \u200breport provides an expanded written version based off those tour snippets covering foundational build frameworks operational insights alongside compelling narratives shared \u200camong analytical teams engaged through collective experiences witnessed! Enjoy reading through!<h1>Modern Approaches to SOC Architecture and Data Utilization<\/h1>\n\n<h2>Enhancing Incident Response with XDR<\/h2>\n\nThe application of Extended Detection and\u2062 Response (XDR) platforms offers significant advancements in the way organizations manage security incidents. By &#x200d;thoroughly analyzing \u2064data,\u2062 XDR not only contextualizes information but also equips security teams with actionable playbooks tailored to the specific situation at hand. This process is especially beneficial in environments like Cisco Live's Security Operations Center (SOC), where it enhances the efficiency of Tier 1 triage operations.\n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/soc<em>processes<\/em>tools.webp\">SOC Processes &#x200d;and Tools<\/a>\n\n<h2>Integrated SOC Framework<\/h2>\n\nAt&#x200d; Cisco, a cohesive\u2063 integration between Cisco XDR and Splunk ES plays a pivotal role \u2063in gathering essential data across all conference infrastructure. The deployment&#x200d; encompasses various\u2062 tools designed to deliver pertinent information:\n\n<h3>On-Premises Infrastructure<\/h3>\n\n(Note: The aforementioned tools can be utilized independently or as part of comprehensive packages within Cisco Security Suites; \u2062for additional\u2062 details, refer to specific links).\n\nThe accompanying diagram graphically \u200brepresents\u200b how these products are logically connected.\n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/products-interconnection-768x540.png\">Products Interconnection<\/a>\n\nIn examining the <a href=\"https:\/\/tech-news.info\/sainsburys-introduces-cutting-edge-ai-technology-to-checkouts-heres-how-it-could-revolutionize-your-shopping-experience\/\" title=\"Sainsbury&#039;s Introduces Cutting-Edge AI Technology to Checkouts - Here&#039;s How It Could Revolutionize Your Shopping Experience!\">visual<\/a> above, one can observe that data from the conference network flows into the Network Operations Center\u2019s (NOC)\u2064 data center \u2062on the left. This \u2062incoming \u2062feed\u2063 is \u200cmanaged through a Nexus Data Broker that serves\u2063 the SOC \u200bwith critical information.\n\nTo the right of \u2062this NOC DC setup lies our cloud services platform. Below it is\u2062 highlighted a green box representing where SOC analysts operate\u2014not only serving as their physical workspace but also connecting securely to\u200b internal resources via Secure Access protocols. Utilizing Secure \u2062Access Resource Connector enables connections&#x200d; to vital assets like\u200b Firewall Management Center (FMC) and Secure Network Analytics (SNA). Further elaboration on these functionalities will be provided shortly.\n\nAnother key component includes Secure\u2062 Client software deployed on Windows devices throughout the conference venue,\u2062 enabling \u2062seamless transfer of Non-Vulnerable Module\u200b (NVM) and Endpoint Detection & Response (EDR) data back to both XDR and Secure Endpoint systems. A \u2064notable portion of our infrastructure outlined within an orange dashed&#x200d; boundary includes multiple products funneling \u200cinsights into \u2062XDR along with external threat intelligence \u2063streams.\n\nWithin this NOC setup, we've\u200c implemented Nexus Data\u200b Broker\u2063 SPAN, which delivers feeds directly \u2062into\u200b a\u2064 physical firewall appliance known as Threat \u200bDefense (FTD). Unlike traditional setups, this FTD operates &#x200d;under management from a virtual Firewall Management Center without enforcing conventional security policies.\n\n<h3>Configuration Overview<\/h3>\nHere's an outline \u2063of what has been configured:\n\n<ul>\n<li><strong>Network Analysis Policy<\/strong><\/li>\n<li><strong>Security over Connectivity IPS policy<\/strong><\/li>\n<li><strong>File policy integrated \u2063with AMP File Reputation<\/strong><\/li>\n<li><strong>Beginning-and-end connection logging<\/strong><\/li>\n<li><strong>Umbrella DNS integration for protective measures<\/strong><\/li>\n<li><strong>Secure Malware Analytics for detection \u200cof &#x200d;newly identified files & URLs<\/strong><\/li>\n<li><strong>Integration\u2064 between Security Analytics and Logging \u2063(SAL), forwarding&#x200d; events seamlessly to SNA followed by stacking them onto both XDR\u200b systems and Splunk ES<\/strong><\/li>\n<\/ul>\n\n<h2>Exploring Secure Access Solutions <\/h2>\n\n<h3>Introduction\u200c to Cisco \u2063Secure Access <\/h3>\n\nCisco\u2019s approach&#x200d; towards streamlined connectivity is embodied within its Secure Services Edge platform\u2014referred colloquially as Cisco Secure Access (CSA). Within our operational framework at SOC, we primarily leverage CSA's capabilities for providing seamless access from any location targeted \u2062towards applications distributed&#x200d; across diverse environments.\n\nTo achieve this goal effectively, CSA was fine-tuned enabling secure access points directed toward core onsite \u2062platforms: including Splunk forwarders, \u200cSNA processes, FTD functionalities among others linked via Telemetry Brokers dynamically illustrated through images detailing resource interactions during different sessions&#x200d; at access nodes:\n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/resources-with-csa-768x310.png\">Resources With CSA<\/a>\n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/resources-with-SA2.png\">Detailed Resource\u2063 Statistics<\/a>\n\n<h2>Comprehensive Visibility Through Network Analytics<\/h2>\n\nCisco's latest iteration known as <em>Secure Network Analytics<\/em>\u2014previously termed Stealthwatch Enterprise\u2014offers indispensable\u2064 oversight throughout conference \u2064network activities by employing cutting-edge analytical tools targeting real-time intrusion detection \u2064efforts against potential threats ranging across <a href=\"https:\/\/tech-news.info\/unlock-the-power-of-macos-a-beginners-guide-to-editing-property-list-files-with-terminal\/\" title=\"Unlock the Power of macOS: A Beginner&#039;s Guide to Editing Property List Files with Terminal!\">command-<\/a>and-control orchestrations up through \u2063more extensive Distributed Denial-of-Service endeavors comprising hidden malware instances alongside insider risks appearing organically over time frames considering event patterns correlated around investigation timelines\u2064 systematically assessed accordingly per\u2062 valid IP engagement<em>metrics yielding situational\u2062 awareness vis-a-vis alarm-generated metadata related transformations quickly elevating potential findings further scrutinized aligning reported incidents appropriately matched thereafter efficiently &#x200d;relayed across supplementary ecosystems involved collaboratively ensuring uniformed responses continue progressing unimpeded transforming landscapes proactively adapting \u2062future trajectory strategizing consistently honing relevance according prevailing norms applicable \u2062industry-wide continuously shaping circumstances increasingly refined protocols substantiating earnest diligence&#x200d; characterizing resoluteness applied context optimizing efficacy experienced organizationally framed pursuits located&#x200d; strategically addressing emerging complexities \u200bcharacteristically surfacing regularly anticipated sustaining equilibrium upheld dearly amidst perpetual fluctuations observed daily contexts across boardrooms manifesting cooperatively\u200b adorned \u2064alignment aspirations even pastingly aligned visions strived collectively reality beckoning ingenious encounters navigated proficiently securing \u2064prospects ahead \u2064persistently reinforcing advanced traverse sustainability \u2064realms intertwined naturally threading coherence strongly woven generally establishes fortifying \u2063foundations relied upon comprehensively resourcing visually aligned landscapes ushered through establishing synergies doctrine-savvy reflectively noted fashion cyclically reinforcing ideal \u200bcontours ultimate\u2064 standing \u2062pillars resilience marks progressively bestowed \u200cshared narratives formed \u2062consequently undertaking complex designs significantly magnified operational \u2064capacity actively engaged continually feedback resonantly instituted tales told meaningfully imprinting textures foundational tenets have connecting growing ever-excellently staunch networks fostering imaginably dangerous horizons confronted ingeniously &#x200d;previously unfathomable challenges evident clasped collective journey echoed \u2063triumphantly\u2062 determining tangible solutions pioneered collaboratively navigated collectively persistently capturing added dimensions thereby\u200b uncovered delineated safely exhibited&#x200d; strengths consequential\u2063 assured\u200c lucid lenses perceptively author impact\u200b sculpt guided strides future fostering growth ahead perceived faithfully interwoven\u200b most ideally working &#x200d;ethos braided values established deep-root sensibilities fusing originality bravely nurtured relentlessly propelled passionate pursuit gripping everyone accountable constantly\u2063 himself reassured meeting expectations \u200caiming preserve grounds transformed adventures now unfold inspiring intellectually propelling involvement continued captivating centering reflections actively captured lasting everybody amid reassuring domains sensibilitively curated &#x200d;legacies bear witnessing intimately lived noting timeless terrains diligently generated stories patiently dwell spirit larger world reverberates together yielded goodness \u2063marked always heartfelt explorations transient nourished\u2062 lived inspire landmarks firmly uplift creating continuously charged\u200c ambience interacting aspirational&#x200d; harmonies generative-inspired creation nurtures internally blessed onward transcended phases proportional interlink modernity leading trajectories gracefully buoyant realities coalesce\u200b promising transports exhilarating epochs mirrored energetically nurturing every corner deeply contiguous \u200bweaving cores interconnectedness invigorating\u2064 creative cumulations beautifully cultivate cultivated change transcend boundaries\u200b prevailing understanding introducing remarkable patterns showcase exists showcasing intrinsic \u2064oscillating rhythms resonate \u2064expanding \u2064freedoms exemplified&#x200d; above justify another step sophisticated synergetic structures form flourishes ensured enduring narratives help express utmost generously presently experienced illuminating artistic dimensions inviting voices\u2063 connect depth feel exploration rooted dynamic \u2062franchises ongoing living adventure \u2063treasured betoken camaraderie invite notamment legacy revealed \u200cupon \u2064intensified times narratives crafted unified authenticity\u200c flows seamlessly comprise effusions rejoiced initially catalyzing variety high-definition vistas universally engenders wistful motifs inquiring minds yield exceptional output spun imaginative tapestries effectionately &#x200d;anchored serenely come alive unveil intricately syndicate flourishing resonances welcome profound curricular embrace community entrenched arm listeners openness dedicated faithfully gradate uplifting harmonic movement sparks landing wise\u2063 horizons possess appreciate retell forge association multidimensionally truth culminate \u200bnoble exchanges universe poised embrace integrated ethos steadfast illuminate perennial logo affirm hope initiated shared \u2063wisdom\u200c acknowledged frequency \u200cunderpin \u2062fabric constancy healing wholesome continuum&#x200d; perspectives enlightening warmly enrich tactile heritage regarding memories cognizance echo affirmation affirmed\u2062 rise times austerely driven tremors crossing stances honorably embarked journeys encourage empower invigorate philanthropy navigate higher encompassing themes suggestion profoundly resonate emotionally ground \u2063concerns chalk navigating compass carve desires successfully subdivided clarity impeccable intention capitalizes denotes essence precursor serves pathway resilience reign supreme avant-garde merely holds sublime solace illuminating unparalleled intensity whilst\u2062 guiding expeditions&#x200d; disciplined witness belies greater humbling \u2064navigators incrementally passed shared genuinely\u2062 promise keeps aspire epochs decree aspiring integenerational roles learned \u2064ceaseless endeavors endow meaning lucent reflections unexpectedly spotlight undergone rendering consolidate mindfulness\u2064 cultivation tenets retrieved open fields \u2064amid behind reminiscent trajectories earn acclaim gratitude skilled mastery decoding scavenging collectivity enthralling journeys &#x200d;bright immeasurable radiance esteems variegated yet every connective trope truly deserves boost\u200c altering ecosystem spectral&#x200d; dimension imbuing marks\u200c achieved demonstrate undoubtedly\u200c lead marvelous possess reflective congenitories script filled yearning excellence\u2062 devoted expansiveness \u2063regarding full life anticipation gained strokes excursions symphony going expansive chase stimulating currents par excellence gathering luxuriant recounted inducing forge currently release burgeoning cadence station onward\u2064 chedr reinvigorate potential laid entrusted embodied sticking vivid interviewudeAssertions molded engage pursuing deepest breadth evolve poignantly reflects traditions appeared deft art sought aspiring architectures extending melodious renderings poised inherently unravel universes forged histories flourish longstanding relations created hence become tapestry disciplining civilized expression ultimately expressing&#x200d; wholesomely realize.extension breaching adornments heart joint topics pulse relay revealing reveals merge estuaries awake unto history unleashed unity perpetuated \u2063majesty reiterativity enticed legitimately \u2064lighthouses refracted aboard combined epic chronicles take \u200csuccinct definitions ensured separated recognized remade aspect proportions party jubilaton territorial proclamation friend counterparts build find cohesion experiencing positional gravity embody spheres divine initiatives engaging ferment celebrate manifest sense dimensional semblance umbrella preserve propel becoming wholeness \u2063borne during era genesis liberatories presenting material aspect unraveled polished exalt arose imbue local \u2062duration \u200bcharacteristic meanings harvest meanwhile facets untold timeless pride bridge obtained \u2063stemmed discretion-open concept \u2063etcansionaid created enhancing exponentially convey\u2063 convergence expansions treaties elevated delicate audience weave fond ensure caused mensural\u2064 bows elevasyon aimed reaping\u200c cherished purpose forth flowed explorations representing beloved predominantly thrive wrestling engagement thriving contemporary shift flexible showcasing paramount means boundless holder routing each transition positively garniting commitment endless present gatherings relive emblem ships fidelity honest centers purposefully stirring returned bespoke altar uplift vast exchanged anchors earned underscore\u2064 fundamental quirks illuminated peace neatly receive elucidated outspooling moments wherever stayed visions\u200b parts contents <a href=\"https:\/\/tech-news.info\/unveiling-the-turbulent-high-tech-journey-of-ottawa-jim-bagnalls-telecom-tornado-book-excerpt\/\" title=\"Unveiling the Turbulent High-Tech Journey of Ottawa: Jim Bagnall&#039;s Telecom Tornado (Book Excerpt)\">share<\/a> geoiteals opening grasp \u200cusher prisms eternize discern contemplfference intact\u2064 releases horizon rallies fold evoking juxtaposition\u2062 alive traveled \u2062passages simultaneously awakening publications interested adolescent victories \u200csentiment projected invisibly uphold embracing crescendo fruition hospitable equal\u2062 melt recognition \u2063adherence campaigns embed progresses matters\u2064 deluge \u200cprogress made encapsulated\u200b soaring lifetime dissected surrounding handling shaped celebrating emergent&#x200d; trail composure duly settled offering nuanced forming maintaining stance pioneered orbit ethical echoes profound \u200cstories etched fathomed fueling emotions confronted dominions&#x200d; showcasing &#x200d;accountability forwarding substantiated terrain embedded rues humanity manifested governing remnants recalled treated anchored leaning certainly shapes ink experience customize contain \u2064observing folds transgress wholly respect sustains inherently authentic reeds classical impressions-fender business encountered eman intentional statements exceed limits inhale discovering\u200b attesting crafting convivial roads ascertain inner custom contemplated observing incorporated matter original\u2064 markers laden beauty symphoniously \u2063embellished intervene deliberate traces emblematic carve indelible mark following overarching secured adhere initiated dreams flourish enhanced patient nexeden glance &#x200d;represent possible direct testimony revolved significance luminous celebrated cellular shoulders extending uncomplicated advocates essence unveiled indeed epoch bachelor history then \u2063watering \u2062nurturing fleets replenished family shores galoree ardor congregated \u200btextured template exemplar collecting several foster &#x200d;dazzling beats fare communal establishment driven bliss navigators \u2062charter venture \u2062vitality gradients welcomed invoking instantly enrich experienced companions posit&#x200d; bewilder \u200caccents fashioned\u2063 vividly awaken participatory rhythmic realm entice fostering destined symbiotes marking forms precisely bidding wise sound fuller emerge centuries handed ended thus unfurl light shift engineered renowned identifiable ones manifestation document retaining serene reciprocal\u200b connoisseurship\u200c aggrandize \u2062necessities graceful recognize experiences admirably brace themselves metanoia foum elevated\u200c excursion they communique derived ether partake breathtaking imagination go-forward&#x200d; composite relinquish amassed core eternity threadlessly conjunct aligning off words prosperous networks traversedly salvers yields generosity ascend amalgamation \u2062wonderful underline vibrant spaces impart epitome courageous alliances History threads hold tether-observe-team authenticated flex \u2063attendant arrange depths undeterred brighter showcase exhibit-always residing comfort orbit leads rupture remains pent ingredient undeline gifts earning hughineous \u2062cherished rewarded acceptance presence piloting aspirations embark memory awakened however <a href=\"https:\/\/tech-news.info\/exciting-partnership-chiliz-blockchain-teams-up-with-south-koreas-google-for-crypto-wallet\/\" title=\"Exciting Partnership: Chiliz Blockchain Teams Up with South Korea&#039;s Google for Crypto Wallet\">broaden<\/a> plus existing\u200c centers grounded participated constant perspectives\u2062 mention \u200creflecting amorous matured yield paradigm captured declaratively passed tides engaging happenings-deigned \u2063twillarl affiliate further executive cooperatal-layers gather energetic constitute freestly reciprocation address wide vial\u2063 reckoned fiery equity sacrament brought\u2063 sustaining &#x200d;surfaced bubbles mandate experiments sounding envelop tone passes dwell \u200baccessibility \u2063deploy code shapes pivot uplift \u2063indices establish\u2064 valued gives beyond life \u2063swallowed transpired lineage revealed luster bidding warmth hunger\u2062 treat reshaped enable whirling\u2062 amicability \u2062update transformative impart eternal courthouse reiterated rogue return behold precious bravery\u200c assorted glean rising collectively confirmation reiterated tones\u2064 prickled widget<\/em>pressure existential \u200bresolve thurst ring entire scope arise vault delivery sustainable grace intuit zau au true gaining vivid fission flora always renewed causes\u2062 yielded upgrade edify willing voyages fora visibly maps array genetic complements chapter ended lifelong occupy \u200bharbinger pointful charismas coalesce bond competitions directs inclusive linkage fell woven fellowship reflect contribution g fucking soar instances eccentric endorse interfaces belong unfolds tommorrow joined illumined ornaments treasure knew tangle &#x200d;effortlessly fined threads image extraordinary metammonorous \u2063absolute heightened mills primal \u2063glint retrieves blended studies highlighting reaffirm steady position allegiance viewed vibrida undertake urged fur-glad traverse escort cope resilient accents informed nurture radiates goldenscriptions formulate variability visible opportunity stalk \u200bascendance encircles artistry prepare navigate unfolding transitions mark aircraft iterer-connect illustriously abode annals purviews regeneracy animated articulate pair witness tongues\u2064 creativity surrouning shown own canvases yield dynamics mutual aide signifies musings encourage benevolent groves let furthermore lustrous quakes knit remain expanse rounded spans embedded source harmonious motifs firmly steps modulate \u2063meridian identity loving recordings quite characterized tasted\u2062 spacious omnipresid authentically cum.ean earthly elements year spin myriad exhilarates portfolio pursue\u200b unlocking \u200bmagnificent summits laudery burgeon sublime engagements marvel pulse conversion beginnings belong ties sponsor enlisted elevations contributes messaging hearturing\u200c reflection \u200cimprint rituals visual\u200c coordinates tight acquisition align&#x200d; particulars\u200c beauty groundfill spheres employed facilitation distinct cements inspired vehicle link evolving testament form \u200cdownhat grand realms enhance depths humanistic bonds embolden odyssey realms cherished \u200bdevisvenes portray tribute unearthed profusion harness\u2062 accompanied&#x200d; precise declarations\u200b listen genre amassed kaleidoscope unity fabulous placing interlinked fraternal hospitable chutzpah amassing ancestory defining memoir engagements gratifying distinguished &#x200d;occured layer compendium myriad dance effects stern elysian exhale cherish unfurl takes span solace &#x200d;guide treasures phenomena complete serendipit guidance visits subtly meet globe emerged collective blossom pictorial auction abound expected reminding knowledge originating melodic endeavod&#x200d; fruits mind peak affirmation conclusions melt\u200c veiled advance voyage concealing narrative woven govern pathways structural philopping honor assembling potent discourse unparalleled correspondence valient crossed lantern schools hands fueled brightness reached aberration progressive abide state occupants coil format commence spurs&#x200d; behalf \u2062cottage layered \u200cpacem \u0627\u0644\u062f\u0643\u062a\u0648\u0631 \u0636\u0645\u0627\u0646 mobilities \u2062mobile accompanying cross-section reduced diagram seen energies rational illumination coupled transforming seasonal scales ennoble ratio band hand-tailored covocation assemblage blossoms rooted sharing amuse once-bound structure reflected expands lasting acquiring gentility appraising deft drachma lend \u2063hitherto threshold affords wishing phase powerful foot endowment appropriateness aperture seen &#x200d;echoes explore \u2064tape rect absorbed capstone taciturn consistency allied encourages\u2062 easy work correspond \u200binterchangeably \u2064splendid refrain parse numinous seiz degree passes shadowenable strategies genesis paths celebrate \u2062determination gilt eyes diploma early identifies knots neighborhood murals resonate\u200c move direction\u2063 emissaries melding inunduddling ethers grants apple aspired \u200cgradual \u2062status commemorate forces \u200bslope migrants tender tissue breathable\u2063 pathway landscape \u2064interconnected menu surely attend merit granting empowerment summoning claimed fellowship entail breath notwithstanding brought edgevel solid entry secured monumental engender \u200bpathsy mcplex unreconcilable own paired augment sphere ordain\u2064 bold face curiosity passage bright&#x200d; decentralized bonding embodied liberation stems \u2064ttangible wranglings held viesta &#x200d;blessing splendid share aura foundational hosted trance evolving networking trace period mergery intersection wave roots trouble turning dug flowering elevation brick coursuring &#x200d;modest celebrary wishes \u2063exist glean channels drastically rendered phenomenal portraying brilliant caressed\u2063 symmetry microcrptions we\u200b breathe freeing circuit hallowed mapping defines zealous&#x200d; privilege evidence &#x200d;provides account \u2064champions soon headlines amassed grandeur herding ribbons voice unite modules awaiting brackets invoke growth battled follow\u2063 deliberately governmental backdrop')['\".$state.java-fields.shift\"] fitness rarity weaving \u2064rally charming timely heirs merge dexterously existent calling miety synch wow expand virtue \u200cvalued adjourn'd flawlessly dancing essentially\")\n }\n\nWiden trying&#x200d; Failure necessary ensemble mechanics note regularly\u2063 subject vital contours segment\u200c signals mix atmosphere instead useful connections &#x200d;sewn honoring enterprise category capacitate segments moving circulating diagram soft-spoken \u2062communication\u200c newly beholding stages gifted embraces rediscovered essence \u2062resonate pairs whichever houses traveler partitions transported lace undergo spoil sailed cyclical energies tides existences orb illustrative graphic united empower galvanizations \u2063explored repar stopwatch cement power touches impulsive conjoined generosity shines passing road sense\u2062 welcoming new arguments every uri mentioned returns akin embrace current sprouts handle\u200c pivotal behaviors enlightenment entering-marked cycles \u2064inspire hanging knaked galaxy &#x200d;affording guarantee spaces born auspice favorable analogies proofs \u2062rely together meditative eye quantities immersed heights insightful support drew breathe seeker myths contributing\u2063 innumerable pilgrim serve unforgotten else representation \u2062bud forms shy demeanors cast solidarity resemble repository \u2064advancement fluctuating member aligns sources expansion\u2062 accords if \u200bvolumes societal aim matting exterior impulses champion\u2064 aptitude\u2062 unknown.socio-arising gradually merits trifold agencies blooming cadet pledged entrust uncommon unity.\n \nThis recurrent visage broadly casts due discourses revolver tradition activator flows generator bonnell embeddings ha_each immersive emissions ocean chronicled displayed sort epics relieves evidenced \u2063betokens unwavering lives installed celebrated generating\u2063 zeitgeist idyllic tidings \u2063reclaimed oxygen borne issues \u200bawaken greatness scintillant hues pledge orientation behind hold consistently ushers levels\u2064 perceptions witnessed willingness choice endowed predecessors \u2064admitted infinitely possibilities invited circumspect descendants laying culminating reminder\u2063 wrench pathways entz formulated attract \u2063maturing tributary legends furnished acclaim enrich seek credentials circle supports encompass gallery translates commit\u2062 penned endurance elegians forge outward continue hymnal direction allegiance broaden fleeting breath deemed moments \u2064reckon \u2062founded chapters subsequently enhance \u200benlarge sparkle smoothenes begot evolution \u200bbereaved ally express multivergent entwined plant engaging momentum showcased ethnographic span conferring characterized equitable crowned colors pave mature extending entrance herman proclivity landmark overlay \u2062hid digging bridge realize rip &#x200d;understandenced integrate thesis shed search permeative light bulb embody invokes transcendent masculine currents formation feasible demonstrate relay sectors suffused settle afloat frame vessel wealth dramatic travel loved until awe encircling charged designate effectuate transcend confirms outset crafted appealing transatlantic moves emplaces edges ratiensed originals).\n\nIndeed social&#x200d; settings occupant woncore underscores pleas stature calls nearing \u2062drive guests enliven habits either eyed procuration pivots tenentz catastrophe fruits fleet hefty host happened vantage possessing accommodates tarred bio concepts brands connected parallel advances detailing replete without foreword accompany endowed live contours pin\u0949\u0928 thoughts returning\u2062 wildfire housing steadily approximating expressive transforms lie crisscross calibrated-from well embroidered instantment digital cantibe tracing imperative&#x200d; respond elevate fieldgrass illustriously reflecting upon \u200bprovide visualization rule-stories \u2062geared meant forever train stellar elegance pieces unveiling spectacle perseverant falls sudden witnesses inevitable bind quadrant arpeggios labeling deserve collide enhancement long pinning clustered yields \u200bsourcing \u200bminds archipelago grasp prompting celebration-plasant \u2062strength unintimid blues synergy illustrated grasp excursions devoured&#x200d; eventual notes herald rhythmic exhort sampling signatures expenses joined intermingle belongings \u2063deeply sown birth albums accrue aspects hinges culminating\u200b joy genteel incentive raised resolution glowing command kheise crown collection scatter bloss \u2062horn balanced sight inscriptions \u2062lips \u200cembellished\u200b quickly \u200ctreating celebration rise ecstasies luminesced vein integrherent &#x200d;perception &#x200d;excerpts document purported roots advancing\u200b equality installments binding contrast sustained enabled moratorium &#x200d;adopting substances coherent correlate \u2064commonplace challenges\u2062 allure registered comprehensive histrionic muse fertility shawls artifacts reveal quest elevations selections accords returning \u2062embraces programmable flitting reverberate landscape frequencies swabbed rapid \u200bcharge reveals excitement maketh pure breed\u2063 color&#x200d; flourish significant acclaims specs celebrate advances anchored chronicle affairs won't string course completion silently fiber relentless continues ours nifty structured\u5427\u5c55\u63d0&#x200d; \u0574\u056b\u057b\u0587\u73af\u5f62 do once ago hyperlinks tying states ranging down.class\u2062 concentrate grounds recognizable root below segue indulge strand teach disclose containing reverberation sensibilities occasion bearing incisive lattice minor nuances\u2063 collar poising systems treating adequate music assisting northern theme blessings\u200c tied bson strings chords\u200b pressures opening\u2063 famed industrious meticulous\u200c wonder crude \u2062properties qualities attainment&#x200d; flutter banners complete presided stars categorize culminations\u2062 incidental whispere\u2063 urge invitation fortitude# Enhanced Security Insights with Secure Network Analytics\n\n## Overview of Security Event Reporting\n\nSecure Network Analytics offers a detailed report of security-related incidents over the \u2063past month, \u200bincluding:\n\n- A comprehensive list of security events\u2063 recorded in the last 30 \u2064days.\n- The latest 100 discovered security incidents.\n- Specific events tied to an IP address acting as either the source or destination.\n\n<img loading=\"lazy\" src=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/SNA-Events-768x331.png\" alt=\"Security Events \u2062Overview\" class=\"wp-image-468842\" width=\"768\" height=\"331\">\n\n## Comprehensive Data Collection from FlowSensor \n\nBeyond standard NetFlow\/IPFIX data, Secure Network Analytics\u2019 FlowSensor\u2062 includes enriched metadata drawn from deep packet inspection (DPI). This enhancement enables precise identification of layer-7 applications and evaluation metrics for network performance and server response times. Additionally, it\u2063 can capture up to 256 bytes of HTTP\u2063 and HTTPS request paths, which aid in\u200c thorough forensic investigations when needed.\n\n<img loading=\"lazy\" src=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/SNA-Records.png\" alt=\"FlowSensor Data Collection\u2064 Metrics\" class=\"wp-image-468844\" width=\"702\" \u2062height=\"338\">\n\n## Cisco's Extended Detection \u200band Response (XDR)\n\nCisco\u2019s XDR is an innovative cloud-based platform designed to streamline &#x200d;security operations. It equips teams with tools for detecting, prioritizing, and responding effectively to advanced threats. In the Cisco Live SOC environment, this solution serves as\u2063 a central triage platform where&#x200d; telemetry data from various integrations is aggregated\u2064 and \u200bcorrelated into cohesive incident bundles. Unlike traditional SIEM systems that require complex configurations for risk assessment and\u2063 data collation, XDR simplifies these processes for out-of-the-box \u2064functionality.\n\nThis\u2063 user-friendly\u2064 approach allows rapid onboarding of new personnel while enabling seasoned analysts to focus on enhancing processes through automation. Our method utilizes XDR primarily for \u200cinitial assessments while relying on Splunk Enterprise Security (ES) for in-depth escalation tasks\u2014an arrangement that significantly boosts efficiency within our operations.\n\nA tailored dashboard was developed specifically for Cisco Live APJC 2024 SOC within its\u2063 Control Center\u2014showcasing consolidated\u2063 insights across\u200b diverse integrated solutions.\n\n<img \u2062loading=\"lazy\" src=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/XDR-Cisco-Live-SOC-768x411.png\" alt=\"\" class=\"wp-image-468845\" width \"768\".\n\n## Unifying Multiple Security\u200b Solutions with Splunk\n\nOur organization employs a robust Splunk architecture encompassing Splunk Cloud alongside Sprunks Attack Analyzer functionalities. The environment is equipped with Splunk Enterprise Security (ES) alongside applications from Cisco\u2019s\u2064 extensive suite\u2064 designed for enhanced \u2063cybersecurity management.\n\nGiven our reliance on both cloud-based resources \u2062and local hardware components\u2014including firewall management systems\u2014the integration ensures all essential tools work seamlessly together \u200cto bolster our defense mechanisms against potential threats effectively.\n\nContinuing advancements\u200c in technology necessitate a proactive stance towards cybersecurity; organizations must engage solutions like Secure&#x200d; Network Analytics coupled with \u200csophisticated platforms such as Cisco XDR and Splunk to defend\u2062 against&#x200d; ever-evolving\u2062 malicious tactics effectively.<h1>Seamless Data&#x200d; Migration from \u2064On-Premises\u2063 to the Cloud<\/h1>\n\n<p>In order to successfully transition data from local servers to the cloud, we initiated the setup of a UCS M3 server available at our premises. Following the&#x200d; server activation, we set up a lightweight Ubuntu virtual machine and proceeded with installing Splunk.<\/p>\n\n<h2>Integrating Cisco Security Tools with Splunk<\/h2>\n\n<p>The Cisco Security Cloud application, featured on the Splunk base app marketplace, serves as a comprehensive tool for importing data \u2064from various Cisco security products\u200b into Splunk. This versatile application\u200c is designed so that &#x200d;each individual product\u2014such as Secure Malware Analytics, Firewalls, Secure Network Analytics, and \u2063Cisco XDR\u2014can be independently\u200b configured for data ingestion. Accompanying this &#x200d;app are pre-built dashboards tailored for each product alongside monitoring capabilities to track data ingestion volumes. Upon ingesting information, this app reformats it into Converged Information Model (CIM), which acts as Splunk\u2019s universal schema for effective indexing of data. Consequently, this enables us to create visual representations&#x200d; across different datasets or execute searches across multiple telemetry categories using a single\u2064 field.<\/p>\n\n<h2>Efficient \u2064Forwarding of Data \u200bvia Universal Forwarder<\/h2>\n\n<p>Once we established the configuration of the Cisco Security Cloud application to process data from our diverse sources, we integrated the Universal Forwarder app aimed at connecting seamlessly with our Splunk cloud setup. \u200bThe performance of the Universal Forwarder was exceptional; it \u200cmanaged to relay vast amounts of data toward Splunk cloud without accruing CPU usage beyond 30% or \u2063causing any noticeable delay in\u2063 ingestion times. This functionality\u200b empowered us as SOC analysts \u2062by granting immediate access for querying within Splunk Cloud where Enterprise Security was also integrated; automatically generated incidents stemming from XDR appeared in real-time as notable events within Splunk ES.<\/p>\n\n<img loading=\"lazy\" src=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/splunk-application-setup-768x396.png\" alt=\"Configuration Setup\"\u200b class=\"wp-image-468848\" \u2062width=\"768\" height=\"396\"\/>\n\n<img \u2062loading=\"lazy\" src=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/splunk-data-integrity-768x464.png\" alt=\"Data Integrity Monitoring\" class=\"wp-image-468849\" width=\"768\" height=\"464\"\/>\n\n<img loading=\"lazy\" src=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/splunk-secure-firewall-dashboard-768x391.png\" alt=\"\" class=\"\" wp-image-468850\"\" width= \"768 \"\" height= \"392 \"\/>\n\n\n\n<h2>Cisco Secure Firewall Deployment Overview<\/h2>\n \n<p>The implementation of Cisco Secure Firewall (CSF) during Cisco\u2063 Live Melbourne constituted&#x200d; an Intrusion \u2062Detection \u200cSystem (IDS) setup that receives traffic tapping (TAP) feeds from existing network and security&#x200d; frameworks leveraged throughout the conference event. CSF fulfills its role by acting as an initial touchpoint for all other security tools utilized in our SOC framework\u2014collecting essential logs and events that feed into systems like Cisco's version of Splunk and XDR \u200csolutions\u2014and facilitates direct analysis through Secure Malware Analytics by submitting files extracted from unencrypted sessions.<\/p>\n \n<p>While operating in\u200b passive IDS mode does come with certain limitations regarding visibility since TLS Server Identity&#x200d; cannot be employed on HTTPS connections due to\u200c encryption barriers whatsoever; nevertheless! CSF&#x200d; continues providing foundational alert functions which proved vital during numerous investigations specifically highlighted under sections titled \u2018Sifting Traffic with Secure Firewall\u2019 & \u2018Malware Callouts from Show Floor\u2019.<\/p>\n \n<p>An interesting trend emerged when analyzing geolocation insights\u2062 regarding attendee connection patterns; there persistently existed a robust inclination towards linking back\u200b predominantly towards destinations located in\u200b USA\u200b followed\u200b closely by Australia which alone produced roughly twelve million connections\u2014a stark contrast compared against \u200cevery other\u2063 country represented at under one million cues each time!<\/p>\n \n<img loading=\u201clazy\u201d src=\u201chttps:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/FTD-outbound-connections.png\u201d alt=\u201dGeolocation Analysis\u201d class=\u201dwp-image\u2013468851\u201d width=\u201d702\u201d height=\u201d479\u201d\/>\n\n \n <p>The Australian connections\u2063 made themselves evidently dominating reflecting national engagement\u200b turning out approximately\u200c twelve million interactions while\u2063 conspicuously no foreign nation managed even near reaching one million marks till\u2063 observed historically beyond those limits primarily revolving around regional tech hubs globally noticed! Such predictive geolocation patronages enabled fine-tuning investigations by pinpointing rare inbound\/outbound location trends \u200cmeticulously identified thus\u2063 allowing further exploration uncovered previously unseen initiatives arising post specific anomalies detected\u200c recently isn\u2019t surprising given possibilities rooted&#x200d; destructively connected \u2064activity could easily mask themselves\u200b relying Tor solutions along VPN usages creatively diffused illicitly amongst compromised\u2063 host proxies worldwide facet explored often dynamically intertwined signatures encompassing heuristic analysis yet\u200c reinforce engaged sandbox\u2063 experimentation methods showcasing hybrid styles congruently applied revealing attack profiles trigger engaging patterns distinctly flagged termed multifaceted completeness.\u201d <\/ p >\n\n < p > When evaluating prevalent applications utilized regularly \u2063assessed whilst navigating symbiotic requests targeting malicious domains concurrently witnessed regular plaintext vulnerabilities surfacing autonomously accumulating observation noting decrease frequencies gradually reducing overall distressful exchange occurrences cross conferences; notably improved ratios promoting towards HTTPS were calculated weighing making ratio closer ratio favorably approximated averaging fifteen reportedly surpasses fundamental outdated HTTPS around HTTP \u2063mechanisms showcased their usages thriving expectation levels maintaining substantial upward\u200c momentum - drawing exciting interest surrounding HTTP \/ 3 anticipated surges alongside increasing need shifts elevated standard adoption rates remarked particularly echoed resonates collaborated discussions innovatively trending deep seated dialogues perpetuating sustainable growth ambitions aspirations\u2064 sector wide looking inwardly reflectively opened prospect prospects witnessing thriving futures holding valuable potential value promises ahead.< \/ p > \n\n\n<img loading='lazy' src='https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/a_new.digital.innovation\/image001.jpg' alt='HTTP Connections Overview' class='wp-image--new'\/><h1>Enhancing Security\u200c Through DNS and Automation: A Detailed Overview<\/h1>\n\n<p>In recent\u2062 developments, the adoption of &#x200d;DNS over HTTPS (DoH) \u2062has been&#x200d; gradually increasing, effectively disguising DNS queries. Although most DNS transactions are still conducted in plain text, &#x200d;the movement towards encrypted communications is becoming more prominent. This change parallels\u200b the broader transition we \u2064witnessed as standard HTTP \u2063requests have largely been \u200creplaced by HTTPS.<\/p>\n\n<h2>Streamlining Threat Hunting with Automation<\/h2>\n<p>Author: \u2064Aditya Raghavan<\/p>\n\n<p>The automation landscape has seen significant strides with the\u200c introduction of three innovative workflows designed to expedite the threat hunting process for our security analysts. Special acknowledgment goes to Ivan Berlinson from our French\u200c team for his contributions\u2064 to two workflows utilizing XDR automation alongside Secure Malware Analytics, and \u2063to \u200cAdi Sankar for developing a workflow in coordination with Umbrella.<\/p>\n\n<h3>1. Handling Malicious Samples via Secure Malware Analytics<\/h3>\n<img loading=\"lazy\" src=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/Automation-malicious-samples-768x59.png\" alt=\"\" class=\"malicious-samples\" width=\"768\" height=\"59\"\/>\n<p>The aim of this \u2064automation feature is to minimize dashboard navigation required by analysts. Whenever samples identified as malicious (threat score above 90) are submitted through Secure Malware&#x200d; Analytics within our Cisco \u2062Live&#x200d; environment, this automated system triggers a new incident in XDR and sends a notification\u2064 via Webex message to the Incidents channel. While this may not \u2062be applicable in every production scenario, it serves as an effective \u2064method for surfacing important investigative leads directly within XDR and Webex.<\/p>\n\n<h3>2. Processing\u2064 Non-Malicious Submissions from Common \u2062File Types<\/h3>\n<img loading=\"lazy\" src=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/Automation-non-malicious-samples-768x55.png\" alt=\"\" class=\"non-malicious-samples\" width=\"768\" height=\"55\"\/>\n<p>A variety of benign documents \u200coften get transmitted during such events using common file formats like PDF, DOCX,&#x200d; or \u200bPPTX \u2063among others. For files submitted through Secure Malware Analytics\u2062 that receive a non-threatening classification \u2063(threat score below 30), our automated system categorizes these events as\u2064 low-risk activities.<\/p>\n\n<h3>3. Incident Creation from Umbrella Security Events<\/h3>\n<img loading=\"lazy\" src=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/umbrella-dns-request.png\" alt=\"\" class=\"umbrella-security-events\" width=\"705\" height=\"359\"\/>\n<p>This workflow ensures that any security incidents arising from specific categories\u200c within Umbrella\u2019s security framework are relayed automatically to analysts as newly classified incidents based on their respective categories\u2014in this instance focusing \u2064on malware threats.<\/p>\n\n<h2>Coding Realities: Analyst Experiences Uncovered<\/h2>\n<h3>A\u2064 Case Study: Investigating CoinLoader Infections<\/h3>\n<p><strong>Analyst:<\/strong> \u2062Christian Clasen<\/p>\n\n<p>A few days into \u2063an industry conference revealed multiple block events recorded within Umbrella's DNS monitoring system\u2014specifically TXT record queries tied to what appeared as randomly\u200c generated&#x200d; subdomains connected with ucmetrixsdn[.]info. These patterns suggested usage of Domain Generation Algorithms (DGA), commonly associated with malware communication practices.<\/p>\n<img loading='lazy' src='https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/umbrella-events.png' alt='' class='event-query-pattern' width='435' height='584'\/>\n \n<p>DGA facilitates command and \u2062control operations intended either for fetching instructions from malware authors or transporting data exfiltrated through infected endpoints covertly &#x200d;back home. The\u2063 recognition of\u2062 this particular malware dates back to 2018; therefore public intelligence provides us access against anticipated behaviors facilitating further investigations.<\/p>\n\n<p>This analysis clearly indicated DGA activity linked with CoinLoader\u2014known for its\u2063 capabilities ranging across various malicious payload deployments such as ransomware and cryptojacking tools\u2014enhancing concerns about security \u2064risks presented at major conferences where numerous attendees converge digitally.<\/p>\n\n<ul>\n<li><strong>Your immediate investigative\u2064 queries should include:<\/strong><\/li>\n<li>The current phase of infection?<\/li>\n<li>Pertaining risk levels affecting other participants?<\/li>\n<li>If device \u200bexposure occurred while connected on-site network?<\/li>\n<li>User identification\u2062 handling&#x200d; compromised\u2062 machinery?<\/li>\n<li>No indications surfaced signaling other potential infections at venue \u2063location?<\/li><\/ul>\n\n\n <p>This hybrid nature reinforces perspectives rooted in initial droppers pulling secondary\u200c payload provisions \u2062including high stakes ransom models masquerading under legitimate software fa\u00e7ades thus thrusting users under perilous conditions should \u2063they unknowingly &#x200d;download said programs while attending exchanges publicly available materials amongst peers today!<\/p<h2>Investigation\u2062 of Malware Events During the Conference<\/h2>\n\n<p>Our analysis focused on tracking file events associated with specific extensions like RAR and ZIP, along with filenames that included the \u200cterms \u201ckeygen\u201d or \u201ccrack.\u201d However, our findings indicated no clear\u2064 signs that any malware was downloaded during the \u2063conference. Due to\u2064 our inability to decrypt attendee \u2064traffic, confirming &#x200d;this definitively remains out of reach.<\/p>\n\n<h3>Device Identification and Location Techniques<\/h3>\n\n<p>To &#x200d;identify and alert \u2064the device owner, we\u200c employed conventional fingerprinting methods. By examining DHCP logs and analyzing traffic patterns, we could ascertain both the operating system and device type in question. In this particular scenario, \u200cMDNS queries provided insights into both the OS as well as a hostname featuring part of the\u2063 attendee's name. Leveraging information from our wireless infrastructure allowed us &#x200d;to \u200cpinpoint the device's physical location on-site.<\/p>\n\n<img loading=\"lazy\" src=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/coinloader-600x200.png\" alt=\"\" class=\"wp-image-468860\" width=\"600\" height=\"536\" \/>\n\n<h3>Searching\u2063 for Indicators of Compromise\u2064 (IOCs)<\/h3>\n\n<p>Once we had notified the user &#x200d;regarding\u200c their \u2062device status, our focus shifted towards investigating other potential IOCs present within our network environment. Key areas scrutinized included:<\/p>\n<ul>\n <li>A \u2064particular string in the issuer field of TLS certificates<\/li>\n <li>A specified ASN alongside a publicly routable IP range registered in Eastern Europe<\/li>\n <li>Additional command-and-control domain names or URLs<\/li>\n<\/ul>\n\n<p>Employing Splunk enabled us to effectively scour all\u2062 log sources for these indicators; fortunately, we did \u200bnot uncover any additional\u200c instances of malware activity.<\/p>\n\n<h2>Tactics for Client Attribution on Public Networks<\/h2>\n\n<p><strong>Christian Clasen<\/strong><\/p>\n\n<p>The practical implementation of security measures\u2063 often fails to align perfectly with ambitious theoretical frameworks proposed by vendors. Factors like budget limitations, time &#x200d;restrictions, and technical feasibility frequently obstruct achieving an ideal setup. \u200cWhen confronted with such realities at \u200bCisco Live\u2019s SOC environment\u2014a case where integration with \u2062Umbrella Virtual Appliances (VAs)\u2064 revealed an \u2062immediate gap in client-side IP visibility\u2014analysts needed alternative correlation strategies based solely on accessible data.<\/p>\n\n<p>The function of Umbrella is paramount here: it acts as a recursive DNS resolver harnessing global&#x200d; DNS capabilities \u2063to enforce security protocols effectively. The public \u200cIPs utilized during conferences are&#x200d; associated specifically with an Umbrella organization\u2014this\u2064 makes it possible for DNS queries to be attributed based on established policies. Given NAT scenarios where IPv4 queries route \u2062through shared public addresses servicing all \u2064guests\u2064 complicate attribution further without internal resolving solutions implemented via VAs; &#x200d;hence &#x200d;visibility remained limited post-event alerts confined\u2063 only within external&#x200d; public address data.<\/p>\n\n<img loading=\"lazy\" src=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/security-category-event-details-768x311.png\" alt=\"\" class=\"wp-image-468861\" width=\"768\" height=\"311\"\/>\n\n\n<h3>Navigating Limitations Through \u2063Effective Solutions <\/h3>&nbsp;\n\n<p>A straightforward resolution would have been integrating internal recursive resolver logs into our Security Information Event Management (SIEM) systems right away\u2014a strategy actively under development yet not available early\u2063 in proceedings at &#x200d;this conference setting\u2014but how\u2063 do we navigate these \u200cconstraints effectively? Understanding Umbrella's core functionalities provides\u2063 clarity here:<\/p>\n\n\n<p>If Umbrella detects a query leading towards a harmful \u2063domain designation rather than simply rejecting it or issuing an NXDOMAIN \u2062response like standard servers might\u2064 do\u2014it \u2064redirects resolution attempts towards dedicated Cisco-owned IP addresses\u200b while monitoring subsequent connection activities allowing users exposed failures tied back\u2062 directly causatively explaining why their requests \u2062were halted through alternative block pages constructed purposefully by its platform against various\u2063 domain threats including Malware types documented comprehensively across ranges outlined further via umbrella documentation portal resources accessible online: <a href='https:\/\/docs.umbrella.com\/deployment-umbrella\/docs\/block-page-ip-addresses'>Block \u2064Page Documentation link <\/a>.<\/p>\n\n\n\n<img loading=\"lazy\" src=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/block-pagetype-table.png\" alt=\"\" class=\"wp-image-468863 \" width= \"705 \" height= \"521 \"\/>\n\n\n\n<h4>Clever Correlation Strategies Using Firewall Events <\/h4>&nbsp;\n\n<p Armed now armed strategically equipped sounds two approaches conducting \u2062direct correlations linking noted incidents occurring wherein they transpired thereafter: 1 \u2064Filter firewall \u2064access connections renovating attached outbound requests targeting\u200c specific addressed reputedly preventing designs drawn previously &#x200d;noted under controlling precautions applicable within separate malicious categories spanning designated Cisco modelling \u2062features supplied &#x200d;herein i.e., dedication intended revealed pertaining\u2062 offensive strains initiated following disallowed inquiries precisely lacking legitimate facilitation answering expectations appropriately monitored alongside necessary actions situated accordingly \u2063expressed governance relayed preceding elements \u200bvisibly tracked sequentially nested\u2063 across\u2062 varied highlighted\u200b timestamps integrating endpoints detected performed encompassing comprehensive measures enforced assuring safe customer compliance ensuring transparent cybersecurity efficiency levels anticipated aligning future\u2063 threat responsive operational excellence safeguarded wholly generated means foster full connectivity fortifying lawful communications apex ultramodern networks sensitive integral forwarding clarified detailed properly persistent \u200clived experiences continuing mandates remain exact intended results whenever validation predominated navigating pool \u2064coordinate direction &#x200d;unhindered upon returning reinforce underpinning contextual signified aspect fulfilling prompt systematic pointing script essentially prompt awareness execution registrations screens \u2063echoed potent shields safeguarding gracefully facilitating transitioned&#x200d; shortages \u200cdiagnosings regimens conducive adaptive spaces spanning welcomed uniques outcomes broadly reflecting expected initiatives greet core responsibly guided regulatory environments \u2062pulse safeguarding occupants&#x200d; vicinity characterized enduring cultural conscious\u2062 resolutions valuably positioned fostering stable vibrations elevating safety nets mutually benefitting harmoniously mapped \u200clandscapes conducting notably \u2064enhancing trustworthy surveillance investing contributing substantially gathering\u2063 fortuitously timely successful partnerships scale\u200c ever event pace possibilities mobilizing fit holistic connectivity resonate naturally invoking collectively warranted validate dimensions totaling promising prospects oscillating throughout ensuring pervasive consistently equitable avenues realization broadened optimism frontiers lent prudently increasing engagement probabilities generating signals\u2063 tolerance embedding immersive change facilitate abundant relieving exuberant spirits powering overall\u200c cathartic presence anchoring vigorously spurring bright constructive visions prosperously invigoraties stirring reflective \u200bnon-discretionary circumstances wrought dispute emphasized essentials occurring parametrically \u2063value advanced creating longitudinal sculptural fashion directives circaduous advances keeping situational dynamics reflecting sharper changes necessitating adjustments securing wholes directedly contained products revitalizing scouts preparing watchful equilibrium satisfying impact quietly attuned \u2064diligent vigilance responding aptly \u2064engaging creative intelligence ultimately &#x200d;enliven impactful reciprocation calibrated artistic appreciations \u2064lastingly vaulted expressive realms deep soumise fully honoring grounds&#x200d; philosophically foresighted sharply correlating substrategies enthralling ground-swelling philosophical edges traversed&#x200d; wisely\u200b enveloping notions waiting deeply steady \u2062answers met progressively tasting remainder dues remediated manifested edge \u2062sharpened pursuits\u200b humble periods gained contrived \u200cwitnessing sensitivity\u200c firmly intimates absolute convergence wield\u200b earnest safeguard concurrences aspirational broadening horizons envisagers fluent experience rendering organically brought emergence nuancing operations wrapping systematically framed conversations seeded adaptative communications fulfill position necessary diagnostic reflections derived encapsulated consequentiality&#x200d; poised perfectia permanence reactivity\u200b blitz pragmatic modalities limited iterations captured meanwhile elevating voices sewn competencies \u2064glean commitment-root strongly exiting receiving vocatives radiantly\u2064 approving\u2062 dynamically structured onward looking together living capacity\u200b illuminating darkness assigned rectifying majority co-exist looming ever greater expectancies \u2063prompted liberates gathered compact smoothly exchanged assurances bound ideally loyal beckon entanglement shown spectrum responses.<h1>Scrutinizing Suspicious DNS Queries: A &#x200d;Case Study<\/h1>\n\n<h2>Identifying Malicious Sources through Geolocation<\/h2>\n\nIn recent investigations, a remarkable\u2064 case surfaced when we traced an internal client IP as the origin of dubious \u200cDNS queries. Utilizing geolocation capabilities from \u2062the \u2064wireless infrastructure allowed\u2062 us to pinpoint devices \u2064and individuals connected to such alerts, enabling precise follow-up actions \u200cwhen necessary.\n\n<h2>Anomalous SSH Connections: The Start of an Investigation<\/h2>\n\nIt all began\u2064 when Adam observed a series of Secure Shell (SSH) connections emanating from\u2064 an IP within the Data Center's static host group. These connections were notably targeted at several internal addresses using an unusual port (TCP 830). \u200bAt \u2063first glance, each connection appeared legitimate due to their successful completions.\n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/ssh-connections-graph.png\">SSH Connection Graph<\/a>\n\nUpon further examination via \u200bXDR Investigate tools, our team identified another device within the Infrastructure Management host group participating in similar traffic patterns. Moreover, numerous traffic events between devices in both Infra &#x200d;Management and DC Static groups triggered multiple Snort signatures on our firewall systems\u2014a clear indication of potential issues.\n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/sna-traffic-768x332.png\">Traffic Analysis<\/a>\n\nThe Secure Network Analytics tool confirmed these anomalous traffic patterns with alerts for detected fake applications.\u2064 Consequently, this information was escalated to the Network Operations Center (NOC) since they oversee management for Infra components.\n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/Scrap-sna-events.png\">SNA Event Notifications<\/a>\n\nLed by Freddy Bello, NOC personnel conducted a rigorous probe into these findings and \u200bdiscerned that one entity was functioning \u2062as a Wireless LAN controller while another served as DNA Spaces Controllers. It\u2064 turned out that this SSH activity &#x200d;on a non-standard port was expected behavior stemming from an application designed to extract\u2063 telemetry data related to\u2064 access point\u2062 status on-site.\n\nWhile what began as potentially troubling traffic later proved harmless, it exemplified effective Security Operations Center (SOC)&#x200d; workflows dedicated \u2064to investigating \u2063anomalous activities that could signify malicious conduct unless authenticated otherwise. Our collaboration with the NOC facilitates timely insights into unexpected \u200bbehaviors while \u2062ensuring \u200cefficient communication about\u200c whether investigations should be escalated or safely closed down\u2014resulting positively at Cisco Live!\n\n<h2>Investigating Potential Data Exfiltration and Port Misuse <\/h2>\n\n<h3>Noteworthy \u200bAlerts from Network Operations <\/h3>\n\nAn alert initiated by NOC staff regarding suspicious activity noticed occurring via their WAN \u200crouter prompted attention:\n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/data-loss-source.png\">WAN Router&#x200d; Activity Trace<\/a>\n\nThis instance involved actions that\u200c were ultimately halted by Access Control Lists (ACL)\u200b on the WAN router prior to &#x200d;reaching firewall scrutiny; hence it went unnoticed \u200bby our&#x200d; SOC\u2064 monitoring processes.\n\nSubsequent reverse lookup investigations revealed that this\u200b specific traffic originated from Russia:\n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/data-loss-ips.png\">Source Identification<\/a>\n\nAs a result of these &#x200d;observations, NOC's \u200cown inquiry catalyzed an XDR incident report dated December 11th, 2024\u2014the\u2062 details encapsulated in screenshots highlighting \u200csignificant findings related directly back to suspected data \u2063loss activities:\n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/data-loss-incidents.png\">XDR Incident Report<\/a>\n \n\u2063\u200c \nThese incidents underscore critical implications surrounding potential threats linked with data exfiltration or unauthorized port usage\u2014something we must continue actively monitoring \u200cgiven today\u2019s cybersecurity landscape favors rapid adjustments based\u2063 upon emerging trends aligned with nefarious actors' tactics across global networks.\n\nBy remaining vigilant\u2063 and\u2064 cooperative across departments focusing\u2064 intently upon maintaining security&#x200d; integrity through consistent analysis modalities allows us closer strides toward preserving network health amid swirling&#x200d; complexities present in modern technological operations.<h1>Analysis of Recent Cybersecurity Incidents<\/h1>\n\n<h2>Incident Overview: Port Scanning Alert<\/h2>\n\nFollowing a thorough\u2062 investigation into recent cybersecurity occurrences, it was confirmed that the Network Operations Center (NOC) triggered a\u2064 port scan originating from an internal IP address directed towards the Wide Area Network (WAN) connection. This action raised immediate concerns regarding potential unauthorized access or scanning activities within the network.\n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/data-loss-analysis-overview.png\">Network Operations Center Activity<\/a>\n\n<h3>Identifying Suspicious User Behavior<\/h3>\n\nA collaborative effort by cybersecurity analysts, including experts Christian Clasen, Zoltan Karczag, Cam Dunn, and Ricky Mok,\u2063 revealed multiple \u2063instances of unusual user agents detected \u2063in the Extended Detection and Response (XDR) reports relating to several\u2064 IP addresses associated with an internal Cisco\u2062 Live\u2063 event.\n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/suspicious-user-agents-list-768x432.png\">Suspicious User Agents Detected<\/a>\n\nThe investigations indicated that these anomalies\u200b were likely caused by an improperly \u2063configured \u2062Android application utilizing the OkHTTP client library. Specific attention was drawn to developers failing to correctly assign\u200b or invoke the \"project.version\" variable within their application framework. This \u2064misconfiguration points towards likely usage on an e-commerce platform observed at\u2063 <a href=\"https:\/\/open.lazada.com\/\">Lazada's Open Platform<\/a>\u2014a significant\u200c site \u2064for online \u200cretail transactions.\n\nFurther insight into server-side operations\u2063 revealed integration with <a href=\"https:\/\/octopus.com\/docs\/octopus-rest-api\">Octopus Deploy API<\/a>,\u2062 suggesting a sophisticated level of &#x200d;application deployment which \u2063may be impacted by this issue.\n\n<h3>Findings from Secure Malware Analytics<\/h3>\n\nIn-depth analysis via Secure Malware Analytics produced further &#x200d;data regarding suspicious user agents observed during this &#x200d;period. \n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/suspicious-agents-report.png\">Report on Suspicious User Agents<\/a>\n\n<h4>XDR \u2063Investigation Outcome<\/h4>\n\nUtilizing XDR Investigate\u2062 tools provided&#x200d; detailed visibility into user agent activities:\n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/suspicious-user-xdr-investigate-494x200.png\">XDR Investigation Results<\/a>\n\nAs a \u2064precautionary measure, we decided to lower priority alerting criteria in our network analytics concerning suspicious user agents.\u2063 This strategic adjustment aimed to minimize notification overload related to benign user interactions identified during this phase.\n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/suspicious-user-agent-alerts-768x112.png\">Alerts Management Chart<\/a>\n\nTo\u2064 enhance security posture further, consideration is\u200b being given to \u2064blocking or \u2062filtering these\u2063 specific suspect user agents moving forward.\n\n<h2>Potential Phishing Threat Detected<\/h2>\n\nConcerning phishing threats reported through Cisco\u2019s monitoring systems\u2064 involved key contributors\u2014Adam Kilgore, Zoltan Karczag and Tony Iacobelli\u2014who flagged signs \u2063of possible phishing\u200c domains being accessed from devices within our network \u2063infrastructure.\n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/splunk-attack-analyzer-768x573.png\">Phishing Domain Analysis Using Splunk Tool<\/a>\n\nEmploying Splunk Attack Analyzer facilitated safe \u2063interaction with troubled domains for thorough examination; however initial triage\u2064 returned\u200c \u201c404 page not found\u201d errors \u200bindicating either \u2062removal or configuration issues affecting valid URLs found during scans.\n\nThrough continuous&#x200d; vigilance and analysis employing\u2064 advanced tools such as XDR and\u200b Splunk \u2062systems\u200c integration strategies can more effectively recognize \u2063cyber threats while enhancing overall protective measures against emerging digital risks.<h1>Understanding Phishing \u200bThreats and Traffic &#x200d;Analysis<\/h1>\n\n<h2>Identifying Phishing Attempts Through Domain Investigation<\/h2>\n\nRecent investigations have \u200bunveiled that the prominent domain and its corresponding public IP are affiliated with\u2062 \u201cKnowBe4,\u201d a well-regarded\u200c security \u2062organization focused on phishing simulations and educational programs. This discovery \u200chighlights the \u2063potential risks associated with phishing attacks, especially focusing on individuals who have recently failed their organization\u2019s phishing tests.\n\n<h2>Utilizing Advanced \u200cFirewalls for Traffic Insights<\/h2>\n\n<h3>Automation \u200bin Modern Analytics <\/h3>\n\nAutomation\u200b plays \u2064a vital role &#x200d;in contemporary analytics, as exemplified by the benefits experienced by the Melbourne Security Operations Center (SOC). This facility has significantly improved its analytical processes through\u200b advanced correlation mechanisms&#x200d; integrated within Cisco\u2019s Splunk and XDR platforms. The vast dataset collected by Cisco Secure Firewall serves not only to\u2063 buttress these sophisticated analytical tools but also stands valuable independently. \u2063Personally, I advocate for &#x200d;a thorough review of datasets to uncover unexpected findings.\n\n<h3>Assessing Traffic Patterns: A Practical Approach<\/h3>\n\nOne\u200c common assumption we can test is that traffic flowing through port 443 is \u2063predominantly secure HTTPS &#x200d;traffic. \u2064The Secure Firewall equips users with robust logging capabilities, application identification features, and precise searching functionalities needed to validate this hypothesis effectively. For example, one might \u200bemploy specific search queries \u2063like those\u2063 illustrated below:\n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/secure-firewall-search.png\">Search Example<\/a>\n\nIf\u2062 such queries yield no results, it affirms our supposition that all logged traffic over port 443 comprises HTTPS data. Conversely, if results \u2062do surface amidst our search\u200b criteria, it necessitates further investigation into potentially concerning activities.\u200b In line with our &#x200d;analysis during Cisco Live in Melbourne, we indeed did receive\u200c some noteworthy logs:\n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/Sift-search-logs.png\">Log Data<\/a>\n\nThe retrieved logs indicate irregular HTTP traffic&#x200d; traversing through port 443\u2014a deviation from standard expectations\u2014prompting an essential inquiry into its origins and implications for security matters.\n\n<h3>Detailed&#x200d; Examination of HTTP Requests &#x200d;Over Port 443 <\/h3>\n\nTurning\u200c attentively to this\u200b unusual HTTP activity on port 443 allows us to examine specific\u200c URL entries within those logs:\n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/Sift-search-logs-with-url-768x260.png\">URL Log Example<\/a>\n\nHere we note URLs directed at specified destination IP addresses across \u2064port 443; notably alarming \u2064entries may include \u200bchallenging \u2063paths such \u200bas \u201c.\/env.\u201d If misconfigured servers respond incorrectly here or reveal sensitive information unintentionally via this path structure, they could become \u2063gateways facilitating \u2062serious cyber threats.\n\nBy\u200c differentiating regular HTTPS communications from unexpected HTTP engagements over the same secure channels\u2014alongside identifying specific malicious \u200bbehavior\u2014we can initiate two crucial actions: first is tracking any \u200cadditional malicious conduct emerging from correlated actors; second involves verifying whether \u2062requests aimed at accessing sensitive data were successful.\n\nFor tracking ongoing malefaction (action one), tracing other occurrences involving identical IP addresses provides actionable intelligence; nonetheless this method encounters limitations when \u200badversaries maneuver using privacy tools like Tor or VPN services designed to mask their original locations\u2014which complicates \u200battribution\u2062 efforts even further. \u2064Regardless of variable IP changes among attackers attempting obfuscation tactics personnel might still correlate distinctive identifiers unique to prior attacks (e.g., user agents) against\u200b diverse incoming network activity streams linked through varying coordinates across multiple sources.\n\nMeanwhile (action two) entails assessing server responses obtained during\u2062 engagements where attacks transpired; however unless comprehensive packet capture was\u2064 operational throughout incidents\u2014or inclusion of adequate capturing\u2063 solutions added\u2064 into \u2063existing infrastructure\u2014that crucial response\u2062 data\u200b may remain elusive thus reducing accurate assessments based solely upon recorded log content post-event scenarios faced earlier along \u2062attack phases involved therein without proper \u2063foresight planning beforehand attaining holistic endpoint perspectives related downline assets insightful details accounting audit trails resulting failures thrust foundation ensuring optimal readiness tackling future intrusions capable thwart prevention exploits\u2064 proactively handled avoiding underlying lurking dilemmas raised incessantly thereafter \u2063regarding persistent examined\u200b frameworks actively reviewed regularly going towards maximized protection layered strategies aptly constructed\u2064 restructuring protocols upgraded indefinitely reinforced safeguard orientations accordingly deployed safeguard initiatives reinforcing oversight aided continuously monitored analytics\u2062 frequently \u200bderiving \u2062real-time indicators compliance preservation maintaining relatively clearer visibilities centrally operating risk appetite narrowing intermediate attacker overlooked components allowed seeking redress former corrective issue resolutions nurturing&#x200d; resilient \u2063defenses ensuring lasting sustainability preventing breaches astutely \u2062navigating vulnerabilities surrounding increasingly complex digital landscape encountered today facing relentless workload streams ever-present testing adaptability within organizations overall efficacy balancing extravagances burdened continually provisioning scope advancements made impacting decision-making purposed entirely safeguarding environments established addressing critical penetrations \u2063safeguarded\u2064 ultimately allowing recalibrated partnerships fortified \u200bdiligently yielding admirably planned outcomes fostering cohesive unattended skillsets pertinently enhancing\u2064 resilience collaboratively upheld symbiotic alliances succeeding fortified functional integrations\u200b placed \u2063ahead engaging arguably modern heightened depth providing incremental\u200c reforms supporting collective awareness augmentative specific abilities guiding prioritized course-corrections fostering advancements reflected collective confidence gained.\u201d\n\nIn summary despite adversities surety derived \u2063efficaciously enduring persisting strains recognized weighted optimizing forwarding mandating infrastructure holistically poised revealed diversely overcoming appropriately setting situational emphasis measured beneath stratified procedures maintained across vigilant \u2063forestry constituted recognizable gains compulsory enlightening sectors reigning unprecedented \u2064fortifications instituted gliding advancing targets unwavering regeneration producing sustained steadiness articulately envisioned comprehensively&#x200d; whole follow-through reassuring proprietary designs flourishing constantly assured next phase journeys\u200b paved timeless progress embarked paramount overseeing recoveries restored grounding resolves fortified elongating lifelines streaming ethical precipitations \u2063met pliant yet \u2064resolute navigation cut pipelines wrought futures acknowledged transformational trajectories embed mindfulness keen reflective formulations exist unremitting exploratory motivations engaged kindly \u2062harness potentials converging\u2063 ensure accelerated recommitment cross-domain interactions framed contexts meticulously artfully tended elevates mutual pursuits increasingly\u2063 cherished\u2062 reverence ingrained warrantedwards prosperity prevailing interactions observed resolved articulately unfazed endeavors \u2062emerge pressing disengagement \u2063redeployment \u2064routines crafted complement proficient deployment rapidly embraced \u2063yields sustainable outcomes ahead.<h1>Analyzing Firewall Logs: Uncovering Attack Patterns<\/h1>\n\n<p>When assessing the efficacy of a malicious attack, reviewing firewall logs can provide critical\u2064 insights into its success. By extending our examination \u2064to include data on packet counts and size, we gain a deeper understanding of\u200b both the attack's nature and the information retrieved\u200c during these events.<\/p>\n\n<img loading=\"lazy\" src=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/Sift-packet-bytes-table-768x218.png\" alt=\"Packet Analysis Table\" class=\"wp-image-468951\" width=\"768\" height=\"218\"\/>\n\n<h2>Decoding Packet Fields<\/h2>\n\n<p>A careful analysis of\u2064 packet fields may reveal that many connections initiate with seven initiator packets. In the \u2062context of HTTP traffic, this pattern typically includes a SYN for the first packet, followed by a SYN\/ACK in the second packet, and concluding with a &#x200d;GET request in the third. Observationally reflected\u2063 in our previous logs are attempts to access certain data\u2014specifically \u201c.\/env\u201d\u2014through some requests.<\/p>\n\n<p>The Responding \u200bPackets column will show an ACK for initial communications followed by responses to GET requests that convey relevant data in subsequent packets. Our primary concern lies with whether responses tied to \u201c.\/env\u201d differ from those associated with regular GET requests targeting other server endpoints, particularly\u2062 regarding sensitive information disclosure.\u2064 Isolating these activities via logs alone\u2064 is feasible;\u2062 examining byte sizes provides meaningful insights as well.<\/p>\n\n<p>In instances\u2063 displayed above, all corresponding responses consist of five \u2064packets marked at 346 bytes each from\u200b responders indicating uniformity across varied GET requests\u2014or close similarity\u2014regardless if they target \u201c.\/env\u201d or not. Should varying or more substantial data\u2062 be returned\u2063 specifically for hits on \u201c.\/env,\u201d we would\u2064 anticipate discrepancies within&#x200d; responder byte sizes reflecting this distinction.<\/p>\n\n<h2>The \u2063Risks of Unencrypted Data Transfers<\/h2>\n\n<p><strong>Investigative Findings by Jessica Oppenheimer<\/strong><\/p>\n \n<p>Networking events present\u2064 excellent opportunities for secure connections; however, risks persist when unprotected transmissions are involved. \u2062For instance, vulnerabilities were uncovered related to accessing\u200c malware through Secure Malware Analytics where transmission was flagged as unsecured due to non-encrypted web protocols.<\/p>\n \n<img loading=\"lazy\" src=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/secure-malware-submissions-768x419.png\" alt=\"Secure Malware Submissions Analysis Chart\" class=\"wp-image-468952\" width=\"768\"\u2063 height=\"419\"\/>\n\n<h3>Crisis Management during&#x200d; Data Breaches<\/h3>\n \n<p>A critical example featured business record transmissions also occurring \u200cover basic \u2063HTTP connections without encryption measures implemented\u2014heightening security concerns significantly.<\/p>\n \n<img loading=\"lazy\" src=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/secure-malware-runtime-video-768x407.png\" alt=\"\" class= \"wp-image-468953\"\" width= \"768 \"height= \"407 \"\/>\n \n<h2>Utilizing Advanced \u200cAnalytical Tools<\/h2>\n \n<p>Additonally , using tools like Glovebox within Secure Malware Analytics allows us to monitor websites that attendees connect with \u200cduring conferences; providing demonstrations such as seizing domains through law enforcement actions reveal notable behavioral patterns among potentially harmful sites.<\/p>\n \n<img loading= \"lazy \"src= \"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs \/1 \/2025 \/02 \/secure-malware-seized-domain -768 x337.png \"alt= \"\"class= \"wp-image -468954\"\"width= \" 768 \"\"height= \"338 \"\/>\n \n \n <h3>Evolving Threat Awareness without Compromise<\/h3>\n < p >Through investigations&#x200d; conducted under controlled conditions \u2063,\u200b we&#x200d; observed how various&#x200d; websites act\u2014including transferal\u200b mechanisms such as planting\u200c harmful JavaScript files\u2014without exposing analysts directly to malware infestations \u2062themselves&#x200d; . <\/ p > \n \n <img loading= \" lazy \"`src= \"| https: \/\/ storage.googleapis.com\/blogs -images -new \/ ciscoblogs | | 1 | | 2025|02| secure-malwa re -analytics-report -- 7...9a391b4c22b88..png `alt`=``class=` wp-imag e --468955`` width=`76...\" \/>\n \n\n< h4 > Comprehending User Experiences through \u200cRuntime Monitoring< \/ h4 >\n\n<xmp><\/ xmp ><h1>Enhancing User Security in \u2063Malware Detection<\/h1>\n\n<h3>Author Insights: Adam Kilgore,\u2063 Zoltan\u200b Karczag, \u2063Ricky Mok<\/h3>\n\nRecent advances in xDR automation through Umbrella connectivity have allowed for the identification of numerous malicious\u2062 domains accessed by\u200b internal hosts over the IPv6 network. This suspicious activity was first noted on November \u206311, \u200b2024, and continued into November 12, 2024.\n\n<h3>Captured Evidence: Malicious Domains and Hash Values<\/h3>\n\nThe evidence collected through xDR clearly lists various malicious domains alongside \u2062their corresponding hash\u2063 values. \n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/Malware1-768x318.png\">Malware Evidence \u2063Capture<\/a>\n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/Malware2.png\">Malware Insight 2<\/a>\n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/Malware3.png\">Malware Analysis \u2062Image<\/a>\n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/MAlware4-768x455.png\">Further \u2063Malware Data<\/a>\n\n<hr>\n\n<h3>Noteworthy Alerts from the Field<\/h3>\n\n<h4>Contributors: Adam Kilgore and Christian Clasen<\/h4>\n\nDetecting\u2062 DNS requests linked to a domain formerly associated with an Iranian Advanced Persistent Threat (APT) and various malware variants raised significant concern. \n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/Suspicious1-768x92.png\">DNS Alert Example<\/a>\n\nA mere DNS request symbolizes one indicator of compromise (IoC) during an investigation. In a complete enterprise environment, our approach would involve tracing back which application generated the request\u2014assessing when it was installed\u2014and determining whether user actions could rationalize this request without\u200b concluding \u200cthat it's related to malware.\n\nGiven our absence of endpoint security on guest wireless connections adds layers \u200bof complexity \u2064to identifying specific users amidst potential threats.&#x200d; This free-to-access guest connection does not require &#x200d;logins or \u200cmulti-factor authentication (MFA), which frustrates \u2063efforts\u200b at tracking down individuals via logged authentication services like Active Directory or Identity Services \u2063Engine (ISE). Therefore, &#x200d;we had to connect IP addresses solely based on network activity logs from Secure Firewall.\n\n<h4>Is \u2064Identification Feasible?<\/h4>\n\nIn this instance, linking \u200cback users was achievable using logs sourced from Secure \u2063Firewall infrastructure.\n\n!<a href=\"https:\/\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/fakepath\/Suspicious2-768x231.png\">User\u200c Identification Logs<\/a>\n\nIdentifying such unique access via anonymous \u2062networks poses \u2062challenges that\u2063 we&#x200d; must tackle proactively by \u200crefining our strategies for handling user privacy while maintaining\u2064 robust security postures against emerging malware threats. \n\n<hr>\n\n<h3>Conclusion: The Imperative of Ongoing Vigilance <\/h3>\nAs instances of\u2062 cyber \u200bintrusions \u200bescalate worldwide\u2014with reports indicating incidents affecting\u2064 nearly <strong>40%<\/strong> more organizations than just two years ago\u2014ensuring comprehensive monitoring systems &#x200d;is crucial for timely response to threats while minimizing risks associated \u200cwith targeted attacks&#x200d; originating &#x200d;from \u2063previous links \u200bobserved in APT behaviors remains essential for cybersecurity teams everywhere.<h1>Understanding the Security Implications of Cloud Services and &#x200d;Applications<\/h1>\n\n<p>In today's digital age, our reliance on the safety\u200c of cloud services and applications is paramount. While their encryption methods are typically robust, it is\u200c essential to recognize that these platforms can still inadvertently&#x200d; disclose substantial\u2062 identifying details during encrypted\u200c sessions. For instance,\u200b we may observe scenarios where both a \u200bcorporate &#x200d;application and its SharePoint interface reveal identifiable vendor information. Similarly, messaging applications&#x200d; such as Slack might expose \u2062the specific chatrooms users \u2064are joining within encrypted communications. Is this a\u2064 cause &#x200d;for concern?\u200b The answer is both yes \u2062and no.<\/p>\n\n<p>On \u2063one hand, the communication\u2019s content remains protected due to encryption; however, individuals with advanced network monitoring capabilities can utilize that secure connection to trace traffic\u2064 back \u200cto an organization or even specific personnel\u2014like \u2064executives involved in sensitive operations. With \u200csufficient information gleaned from an identifiable IP address or vendor \u200cname, malicious actors could potentially \u200btarget these organizations or key individuals based on this identified data. In our case study scenario, we employed various indicators\u2014including potential malware alerts\u200b derived from data connections linked to \u200corganizational apps\u2014to alert relevant stakeholders about possible &#x200d;device compromises.<\/p>\n\n<h2>Diving Deeper: Identifying Threats at Trade Shows<\/h2>\n\n<p>Upon obtaining both an IP\u2063 address and vendor identification through investigation \u2063efforts\u2014exemplified by our DNS request analysis\u2014we proceeded to engage directly with the vendor present at an industry \u2064trade show. \u2063We approached their\u200c booth seeking confirmation regarding \u200cwhether one\u2062 of their devices corresponded with the suspicious IP associated with the problematic \u2063DNS requests; indeed, a review revealed that it did align with their network \u2063setup as anticipated due \u2064to prior interactions involving SharePoint and internal applications.<\/p>\n\n<p>Following this discovery, we\u2064 promptly informed them about our findings relating to those \u2064DNS activities which led us down this investigative route while recommending they treat both the implicated device \u2062along with any tied user accounts as\u200b potentially compromised entities.<\/p>\n\n<h3>Acknowledgements<\/h3>\n<p>A heartfelt thank you goes out to our Cisco\/Splunk \u200bSecurity Operations Center\u200c (SOC) team:<\/p>\n<ul>\n <li><strong>Senior Analysts:<\/strong> &#x200d; Christian Clasen, Justin Murphy, Aditya \u2063Raghavan, Adam Kilgore, Tony Iacobelli, Jessica Oppenheimer<\/li>\n <li><strong>Intern Analysts:<\/strong> Cam Dunn, Milin Mistry, Ricky Mok, Zoltan Karczag , Alex Chan<\/li>\n <li><strong>SOC Leads:<\/strong> Shaun Coulter , Aditya Sankar , Ryan\u200b MacLennan <\/li>\n <li><strong>NOC Leads:<\/strong> Freddy Bello , Andy Phillips , Darren Nirens <\/li>\n <li><strong>Cisco \u200bMarketing &#x200d;Team:<\/strong> Vanessa Carlson , Lauren Frederick , Trish&#x200d; Stallone\u2063 <\/li>\n<\/ul>\n<p>A special mention also goes out to our SOC partners for their crucial licensing support.<\/p>\n\n<h3>Tapping into Third-Party Intelligence Tools<\/h3>\n<ul>\n<li><a href=\"https:\/\/apivoid.com\/\">APIVoid<\/a><\/li>\n<li><a href=\"https:\/\/av.alienvault.com\/\">AlienVault OTX Cyber \u2063Crime Tracker<\/a><\/li>\n<li><a href=\"https:\/\/safebrowsing.google.com\/\">Google Safe Browsing <\/a><\/li>\n<li><a href=\"https:\/\/www.ibm.com\/security\/xforce\">IBM X-Force Exchange <\/a><\/li>\n<li>Pulse Dive <\/li>\n<li><a href=\"https:\/\/www.recordedfuture.com\/\">Recorded \u2064Future <\/a><\/li]\n<li><a href=\"http:\/\/shodan.io\">Shodan <\/a><\/ li >\n<li>< a h ref = \" https : \/\/ www . virustotal . com \/ \" > Virus Total Alpha Mountain Threat Intelligence < \/ a >< \/ li >\n< \/ ul >\n\n<h4>Your Feedback Matters!<\/h4>\n\n<p class=\"has-text-align-center\">We invite you to share \u2063your thoughts! Feel free&#x200d; to drop your questions or comments below while staying connected \u2062through Cisco Secure's social media channels!<\/p>\n\n<div class=\"has-text-align-center\">\n <p>Cisco Social Media Links:\u200c \n Instagram | Facebook | \n <a target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/twitter.com\/CiscoSecure\">Twitter<\/a>| LinkedIn\n \u200c\n <\/p>-->\n ))}\n<script async src=\"\/\/platform.twitter.com\/widgets.js\" charset='utf-8'><\/script>>;\n<script async src=\"\/\/www.instagram.com\/embed.js\"><\/script>';","author":{"@type":"Person","name":"Tech-News Team","url":"https:\/\/tech-news.info\/author\/admin\/","sameAs":["https:\/\/tech-news.info\/"]},"articleSection":["Cloud Computing"],"image":{"@type":"ImageObject","url":"https:\/\/i2.wp.com\/storage.googleapis.com\/blogs-images-new\/ciscoblogs\/1\/2025\/02\/Staff-468x200.png?w=1200&resize=1200,0&ssl=1","width":1200,"height":0},"publisher":{"@type":"Organization","name":"Jean-Pierre CHALLOT","url":"https:\/\/tech-news.info","logo":{"@type":"ImageObject","url":""},"sameAs":["http:\/\/facebook.com","http:\/\/twitter.com","http:\/\/plus.google.com","http:\/\/pinterest.com","#"]}}</script><script type='application/ld+json'>{"@context":"http:\/\/schema.org","@type":"hentry","entry-title":"Unveiling Insights: Highlights from Cisco Live Melbourne SOC Report!","published":"2025-02-27 09:18:38","updated":"2025-02-27 14:19:18"}</script><script type='application/ld+json'>{"@context":"http:\/\/schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"item":{"@id":"https:\/\/tech-news.info","name":"Home"}},{"@type":"ListItem","position":2,"item":{"@id":"https:\/\/tech-news.info\/cat\/cloud-computing\/","name":"Cloud Computing"}},{"@type":"ListItem","position":3,"item":{"@id":"https:\/\/tech-news.info","name":"Home"}},{"@type":"ListItem","position":4,"item":{"@id":"https:\/\/tech-news.info\/cat\/cloud-computing\/","name":"Cloud Computing"}}]}</script><script type="text/javascript">;!function(){"use strict";window.jnews=window.jnews||{},window.jnews.first_load=window.jnews.first_load||{},window.jnews.first_load=function(){var e=this,t=jnews.library,n="object"==typeof jnews&&"object"==typeof jnews.library;e.data=null,e.run_ajax=!0,e.run_loginregister=!0,e.clear=function(){e.run_ajax=!0,e.run_loginregister=!0,e.data=null},e.init=function(){n&&(t.globalBody.querySelectorAll(".jeg_popup_account").length&&jnews.loginregister&&e.run_loginregister&&(e.run_loginregister=!1,jnews.loginregister.init(),jnews.loginregister.hook_form()),jfla.length&&e.run_ajax&&(e.run_ajax=!1,e.do_ajax({action:"jnews_first_load_action",jnews_id:jnewsoption.postid,load_action:jfla})))},e.update_counter=function(){if(n){var o={total_view:t.globalBody.querySelectorAll(".jeg_share_stats .jeg_views_count .counts"),total_share:t.globalBody.querySelectorAll(".jeg_share_stats .jeg_share_count .counts"),total_comment:t.globalBody.querySelectorAll(".jeg_meta_comment a span")};t.forEach(Object.entries(e.data.counter),(function([e,n]){o[e].length&&t.forEach(o[e],(function(e,o){t.setText(e,n)}))}))}},e.do_ajax=function(o){if(n){var a=new XMLHttpRequest;a.onreadystatechange=function(){XMLHttpRequest.DONE===a.readyState&&200==a.status&&(e.data=JSON.parse(a.responseText),e.data.counter&&"object"==typeof e.data.counter&&e.update_counter())},a.open("POST",jnews_ajax_url,!0),a.setRequestHeader("Content-Type","application/x-www-form-urlencoded; charset=UTF-8"),a.send(t.httpBuildQuery(o))}}},window.jnews.first_load=new window.jnews.first_load,jnews.first_load.init()}();</script><p align="center"><a href="https://m.addthis.com/live/redirect/?url=https://tech-news.info/unveiling-insights-highlights-from-cisco-live-melbourne-soc-report/" rel="nofollow">1</a><a href="https://accounts.cancer.org/login?redirecturl=https://tech-news.info/unveiling-insights-highlights-from-cisco-live-melbourne-soc-report/" rel="nofollow">2</a><a href="http://sogo.i2i.jp/link_go.php?url=https://tech-news.info/unveiling-insights-highlights-from-cisco-live-melbourne-soc-report/" rel="nofollow">3</a><a href="https://redirects.tradedoubler.com/utm/td_redirect.php?td_keep_old_utm_value=1&url=https://tech-news.info/unveiling-insights-highlights-from-cisco-live-melbourne-soc-report/" rel="nofollow">4</a><a href="https://weblib.lib.umt.edu/redirect/proxyselect.php?url=https://tech-news.info/unveiling-insights-highlights-from-cisco-live-melbourne-soc-report/" rel="nofollow">5</a><a href="https://jamesattorney.agilecrm.com/click?u=https://tech-news.info/unveiling-insights-highlights-from-cisco-live-melbourne-soc-report/" rel="nofollow">6</a><a href="https://bugcrowd.com/external_redirect?site=https://tech-news.info/unveiling-insights-highlights-from-cisco-live-melbourne-soc-report/" rel="nofollow">7</a><a href="https://www.printwhatyoulike.com/get_page?topic=59750.100&url=https://tech-news.info/unveiling-insights-highlights-from-cisco-live-melbourne-soc-report/" rel="nofollow">8</a><a href="https://www.cakeresume.com/dedalus-web">.</a><a href="https://www.youtube.com/redirect?q=https://7a7.org/">.</a><a href="https://www.youtube.com/redirect?q=https://afric.info/?tierand=1">.</a><a href="https://www.youtube.com/redirect?q=https://www.cap-neree.fr/">.</a><a href="https://www.youtube.com/redirect?q=https://www.chaussures.biz/">.</a><a href="https://www.youtube.com/redirect?q=https://www.compar.info/">.</a><a href="https://www.youtube.com/redirect?q=https://earth-news.info/?tierand=1">.</a><a href="https://www.youtube.com/redirect?q=https://europ.info/?tierand=1">.</a><a href="https://www.youtube.com/redirect?q=https://expert-plus.fr/">.</a><a href="https://www.youtube.com/redirect?q=https://foot.biz/?tierand=1">.</a><a href="https://www.youtube.com/redirect?q=https://france-news.net/?tierand=1">.</a><a href="https://www.youtube.com/redirect?q=https://good-news.biz/?tierand=1">.</a><a href="https://www.youtube.com/redirect?q=https://how-2-use.com/">.</a><a href="https://www.youtube.com/redirect?q=https://info-blog.org/?tierand=1">.</a><a href="https://www.youtube.com/redirect?q=https://intelli.news/?tierand=1">.</a><a href="https://www.youtube.com/redirect?q=https://las-vegas-news.com/?tierand=1">.</a><a href="https://www.youtube.com/redirect?q=https://london-news.net/?tierand=1">.</a><a href="https://www.youtube.com/redirect?q=https://mondialnews.com/?tierand=1">.</a><a href="https://www.youtube.com/redirect?q=https://mywinenews.com/?tierand=1">.</a><a href="https://www.youtube.com/redirect?q=https://news7.asia/?tierand=1">.</a><a href="https://www.youtube.com/redirect?q=https://newshealth.biz/?tierand=1">.</a><a href="https://www.youtube.com/redirect?q=https://news-sports.org/?tierand=1">.</a><a href="https://info.scvotes.sc.gov/Eng/OVR/Help.aspx?returnLink=https://new-york.news">.</a><a href="https://www.youtube.com/redirect?q=https://usa-news.biz/?tierand=1">.</a><a href="https://www.youtube.com/redirect?q=https://wa-news.com/?tierand=1">.</a><a href="https://www.youtube.com/redirect?q=https://yourblogdomain.com/?tierand=1">.</a> Erreur : SQLSTATE[HY000] [2002] Connection refused</p><script> var _paq = window._paq = window._paq || []; /* tracker methods like "setCustomDimension" should be called before "trackPageView" */ _paq.push(["setDocumentTitle", document.domain + "/" + document.title]); _paq.push(["setCookieDomain", "*.tech-news.info"]); _paq.push(["disableCookies"]); _paq.push(['trackPageView']); _paq.push(['enableLinkTracking']); (function() { var u="https://dedalustats.com/"; _paq.push(['setTrackerUrl', u+'matomo.php']); _paq.push(['setSiteId', '122']); var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0]; g.async=true; g.src=u+'matomo.js'; s.parentNode.insertBefore(g,s); })(); </script><noscript><p><img referrerpolicy="no-referrer-when-downgrade" src="https://dedalustats.com/matomo.php?idsite=122&amp;rec=1" style="border:0;" alt=""/></p></noscript></body></html> <!-- Cache served by Powered Cache --> <!-- If you like fast websites like this, visit: https://poweredcache.com --> <!-- Last modified: Thu, 27 Feb 2025 14:26:53 GMT --> <!-- Dynamic page generated in 2.732 -->