• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Cisco Umbrella

Enterprise network security

  • Contact Sales
  • Login
    • Umbrella Login
    • Cloudlock Login
  • Why Us
    • Why Cisco Umbrella
      • Why Try Umbrella
      • Why DNS Security
      • Why Umbrella SASE
      • Our Customers
      • Customer Stories
      • Why Cisco Secure
    • Fast Reliable Cloud
      • Global Cloud Architecture
      • Cloud Network Status
      • Global Cloud Network Activity
    • Unmatched Intelligence
      • A New Approach to Cybersecurity
      • Interactive Intelligence
      • Cyber Attack Prevention
      • Umbrella and Cisco Talos Threat Intelligence
    • Extensive Integrations
      • IT Security Integrations
      • Hardware Integrations
      • Meraki Integration
      • Cisco Umbrella and SecureX
  • Products
    • Cisco Umbrella Products
      • Cisco Umbrella Cloud Security Service
      • Recursive DNS Services
      • Cisco Umbrella SIG
      • Umbrella Investigate
      • What’s New
    • Product Packages
      • Cisco Umbrella Package Comparison
      • – DNS Security Essentials Package
      • – DNS Security Advantage Package
      • – SIG Essentials Package
      • – SIG Advantage Package
      • Umbrella Support Packages
    • Functionality
      • DNS-Layer Security
      • Secure Web Gateway
      • Cloud Access Security Broker (CASB)
      • Cloud Data Loss Prevention (DLP)
      • Cloud-Delivered Firewall
      • Cloud Malware Protection
      • Remote Browser Isolation (RBI)
    • Man on a laptop with headphones on. He is attending a Cisco Umbrella Live Demo
  • Solutions
    • SASE & SSE Solutions
      • Cisco Umbrella SASE
      • Secure Access Service Edge (SASE)
      • What is SASE
      • What is Security Service Edge (SSE)
    • Functionality Solutions
      • Web Content Filtering
      • Secure Direct Internet Access
      • Shadow IT Discovery & App Blocking
      • Fast Incident Response
      • Unified Threat Management
      • Protect Mobile Users
      • Securing Remote and Roaming Users
    • Network Solutions
      • Guest Wi-Fi Security
      • SD-WAN Security
      • Off-Network Endpoint Security
    • Industry Solutions
      • Government and Public Sector Cybersecurity
      • Financial Services Security
      • Cybersecurity for Manufacturing
      • Higher Education Security
      • K-12 Schools Security
      • Healthcare, Retail and Hospitality Security
      • Enterprise Cloud Security
      • Small Business Cybersecurity
  • Resources
    • Content Library
      • Top Resources
      • Cybersecurity Webinars
      • Events
      • Research Reports
      • Case Studies
      • Videos
      • Datasheets
      • eBooks
      • Solution Briefs
    • International Documents
      • Deutsch/German
      • Español/Spanish
      • Français/French
      • Italiano/Italian
      • 日本語/Japanese
    • Security Definitions
      • What is Secure Access Service Edge (SASE)
      • What is Security Service Edge (SSE)
      • What is a Cloud Access Security Broker (CASB)
      • Cyber Threat Categories and Definitions
    • For Customers
      • Support
      • Customer Success Webinars
      • Cisco Umbrella Studio
  • Trends & Threats
    • Market Trends
      • Hybrid Workforce
      • Rise of Remote Workers
      • Secure Internet Gateway (SIG)
    • Security Threats
      • How to Stop Phishing Attacks
      • Malware Detection and Protection
      • Ransomware is on the Rise
      • Cryptomining Malware Protection
      • Cybersecurity Threat Landscape
      • Global Cyber Threat Intelligence
    •  
    • Woman connecting confidently to any device anywhere
  • Partners
    • Channel Partners
      • Partner Program
      • Become a Partner
    • Service Providers
      • Secure Connectivity
      • Managed Security for MSSPs
      • Managed IT for MSPs
    •  
    • Person looking down at laptop. They are connecting and working securely
  • Blog
    • News & Product Posts
      • Latest Posts
      • Products & Services
      • Customer Focus
      • Feature Spotlight
    • Cybersecurity Posts
      • Security
      • Threats
      • Cybersecurity Threat Spotlight
      • Research
    •  
    • Register for a webinar - with illustration of connecting securely to the cloud
  • Contact Us
  • Umbrella Login
  • Cloudlock Login
  • Free Trial

Cisco Umbrella Blog

Cybersecurity Threats

Cyberattacks and Cybersecurity in Europe: Targets and Trends

Author avatar of Kate MacLeanKate MacLean
Updated — July 1, 2020 • 3 minute read
View blog >

Businesses must understand the types of cyberattacks they may encounter and how to implement strong cybersecurity practices. Find out what's up in Europe.

Go Phish: Avoid Being Hooked by Phishing Emails

Author avatar of Negisa TaymourianNegisa Taymourian
Updated — February 22, 2023 • 3 minute read
View blog >

Phishing Phishers usually masquerade as a trustworthy entity in an electronic communication. That’s probably why it accounts for 90% of data breaches.

Today’s Catch: Phishing Roundup – Part 2

Author avatar of Josh PyorreJosh Pyorre
Updated — March 22, 2020 • 2 minute read
View blog >

in part two of our phishing roundup, we're going to look at trending brands targeted in phishing attacks over the past three months.

Today’s Catch: Phishing Roundup – Part 1

Author avatar of Andrea KaiserAndrea Kaiser
Updated — March 25, 2020 • 4 minute read
View blog >

Picture perfect: How JPG EXIF data hides malware

Author avatar of Shyam Sundar RamaswamiShyam Sundar Ramaswami
Updated — February 23, 2023 • 5 minute read
View blog >

Learn some of the techniques hackers use to embed malware in jpgs, how to identify it and how to keep yourself protected!

Emotet malspam trojan — the gift that keeps on giving

Author avatar of Kevin RollinsonKevin Rollinson
Updated — March 22, 2020 • 2 minute read
View blog >

Check Your Electric Bill – Malicious Cryptomining Is Lighting up the Internet

Author avatar of Negisa TaymourianNegisa Taymourian
Updated — October 15, 2020 • 3 minute read
View blog >

This browser-or software-based threat enables bad actors to hijack system resources to generate cryptocurrencies for nefarious purposes.

You Know, for Science

Author avatar of Andrea KaiserAndrea Kaiser
Updated — March 1, 2020 • 6 minute read
View blog >

Belated Christmas Greetings from Emotet

Author avatar of Andrea KaiserAndrea Kaiser
Updated — May 2, 2022 • 4 minute read
View blog >

Learn all about Emotet and how it can affect your online usage. This trojan can really put a damper on your holiday season. Fight back now!

Protecting ICOs and cryptocurrency users

Author avatar of Artsiom HolubArtsiom Holub
Updated — July 24, 2020 • 3 minute read
View blog >

Top Blogs

  • Umbrella Extends Protection to Unmanaged iOS and Android Devices September 13, 2022 2 minute read
  • New Security for a World Where Everyone and Everything Are Connecting August 30, 2022 3 minute read
  • Should You Use DNS Data to Drive Better Security Decisions? August 25, 2022 2 minute read

Follow us

  • Twitter
  • Facebook
  • LinkedIn
  • YouTube
  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Go to page 5
  • Go to page 6
  • Go to Next Page »

Follow Us

  • Twitter
  • Facebook
  • LinkedIn
  • YouTube

Footer Sections

What we make

  • Cloud Security Service
  • DNS-Layer Network Security
  • Secure Web Gateway
  • Security Packages

Who we are

  • Global Cloud Architecture
  • Cloud Network Status
  • Cloud Network Activity
  • OpenDNS is now Umbrella
  • Cisco Umbrella Blog

Learn more

  • Webinars
  • Careers
  • Support
  • Cisco Umbrella Live Demo
  • Contact Sales
Umbrella by Cisco
208.67.222.222+208.67.220.220
2620:119:35::35+2620:119:53::53
Sign up for a Free Trial
  • Cisco Online Privacy Statement
  • Terms of Service
  • Sitemap

© 2023 Cisco Umbrella