Skip to main content

Netography Blog

Netography Fusion Detects Post-Compromise Behavior from Critical Cisco Zero-Day Vulnerability Blog

Netography Fusion Detects Post-Compromise Behavior from Critical Cisco Zero-Day Vulnerability

Active exploitation of this vulnerability installs a malware implant on affected devices allowing attackers to execute arbitrary commands with full privileges. Unlike single-event-based detections, Netography detection models only trigger after observing follow-on exploitation behavior of…
October 20, 2023