Media Summary: In this series of videos, we investigate how to perform common SOC tasks using Craig Williams, Director of Talos Outreach, talks with Greg Otto about the attack on the Winter This paper by Paul Rascagnères & Warren Mercer (

Cisco Threat Response Olympic Destroyer - Detailed Analysis & Overview

In this series of videos, we investigate how to perform common SOC tasks using Craig Williams, Director of Talos Outreach, talks with Greg Otto about the attack on the Winter This paper by Paul Rascagnères & Warren Mercer ( The more security products you buy, the more complex your security investigations become. In this session, you'll learn how to ... From US Department of Justice: "On Oct. 15, 2020, a federal grand jury in Pittsburgh returned an indictment charging six computer ... Watch the Whole Series: Episode 1: Episode 2: Episode 3: ...

Photo Gallery

Cisco Threat Response: Olympic Destroyer
Cisco Security HOWTO : Threat Hunting : Olympic Destroyer
Cisco Talos's Craig Williams on Olympic Destroyer's false flags
Olympic Destroyer | Malware attacks Winter Olympics
Who wasn’t responsible for Olympic Destroyer? (Paul Rascagnères & Warren Mercer)
Securing the Olympics: The Cybersecurity Architecture for Paris 2024 | Cisco Live 2025
CSIRT Monitoring for the Cisco House at the London 2012 Olympics Games
Cisco Accelerating Investigations with Cisco Threat Response
Inside Cisco Talos: How Threat Hunters Combat Ransomware Attacks | Cybersecurity Insights
Olympic Destroyer
Following DOJ indictment, a look back on NotPetya and Olympic Destroyer research. [Research Saturda
Olympic Destroyer: The Story of How the 2018 Olympics Was Hacked & the False Flags Raised! (EP 2)
Sponsored
View Detailed Profile
Cisco Threat Response: Olympic Destroyer

Cisco Threat Response: Olympic Destroyer

Cisco Threat Response

Cisco Security HOWTO : Threat Hunting : Olympic Destroyer

Cisco Security HOWTO : Threat Hunting : Olympic Destroyer

In this series of videos, we investigate how to perform common SOC tasks using

Cisco Talos's Craig Williams on Olympic Destroyer's false flags

Cisco Talos's Craig Williams on Olympic Destroyer's false flags

Craig Williams, Director of Talos Outreach, talks with Greg Otto about the attack on the Winter

Olympic Destroyer | Malware attacks Winter Olympics

Olympic Destroyer | Malware attacks Winter Olympics

The 2018 Pyeongchang

Who wasn’t responsible for Olympic Destroyer? (Paul Rascagnères & Warren Mercer)

Who wasn’t responsible for Olympic Destroyer? (Paul Rascagnères & Warren Mercer)

This paper by Paul Rascagnères & Warren Mercer (

Sponsored
Securing the Olympics: The Cybersecurity Architecture for Paris 2024 | Cisco Live 2025

Securing the Olympics: The Cybersecurity Architecture for Paris 2024 | Cisco Live 2025

CiscoLive #CiscoSecurity #SecOps The

CSIRT Monitoring for the Cisco House at the London 2012 Olympics Games

CSIRT Monitoring for the Cisco House at the London 2012 Olympics Games

Learn more about Computer Security

Cisco Accelerating Investigations with Cisco Threat Response

Cisco Accelerating Investigations with Cisco Threat Response

The more security products you buy, the more complex your security investigations become. In this session, you'll learn how to ...

Inside Cisco Talos: How Threat Hunters Combat Ransomware Attacks | Cybersecurity Insights

Inside Cisco Talos: How Threat Hunters Combat Ransomware Attacks | Cybersecurity Insights

Join

Olympic Destroyer

Olympic Destroyer

A brief look at the

Following DOJ indictment, a look back on NotPetya and Olympic Destroyer research. [Research Saturda

Following DOJ indictment, a look back on NotPetya and Olympic Destroyer research. [Research Saturda

From US Department of Justice: "On Oct. 15, 2020, a federal grand jury in Pittsburgh returned an indictment charging six computer ...

Olympic Destroyer: The Story of How the 2018 Olympics Was Hacked & the False Flags Raised! (EP 2)

Olympic Destroyer: The Story of How the 2018 Olympics Was Hacked & the False Flags Raised! (EP 2)

Watch the Whole Series: Episode 1: https://youtu.be/Npd71InV-NY Episode 2: https://youtu.be/qhlF4fvwssM Episode 3: ...

Cisco Security HOWTO: Threat Hunting by Malware Behavior

Cisco Security HOWTO: Threat Hunting by Malware Behavior

Karel Simek from