- Our Favorite Topics:
Threat Roundup for August 30 to September 6
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 30 and Sep. 6.
GhIDA: Ghidra decompiler for IDA Pro
1 min read
Executive Summary Cisco Talos is releasing two new tools for IDA Pro: GhIDA and Ghidraaas. GhIDA is an IDA Pro plugin that integrates the Ghidra decompiler...
The latest on BlueKeep and DejaBlue vulnerabilities — Using Firepower to defend against encrypted DejaBlue
1 min read
Over the past few months, Microsoft has released several security updates for critical Remote Desktop Protocol (RDP)-related security bugs. These bugs are significant for IT infrastructure because they are classified...
New Forensic Investigation Procedures for First Responder Guides
2 min read
Cisco announces a new series of guides that help customers and partners triage Cisco products that are suspected of being tampered with or compromised.
Threat Roundup for August 23 to August 30
1 min read
Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 23 and Aug. 30.
Cisco Advanced Malware Protection for Endpoints Awarded AV-Comparatives’ Approved Business Product Award
3 min read
We are very pleased to share the news that our Advanced Malware Protection (AMP) for Endpoints won the Approved Business Security Award from AV-Comparatives. And we’re happy about...
Boosting Trust with Industry-Leading APEC PRP Certification
1 min read
Cisco is now certified under the new APEC Privacy Recognition for Processors (PRP) System. Cisco, an advocate for safe and secure global data flows, is the eighth company to be PRP certified.
Insights Regarding the Cisco REST API Container for IOS XE Software Authentication Bypass Vulnerability
3 min read
On August 28th, 2019, Cisco published a Security Advisory disclosing an internally found vulnerability affecting the Cisco REST API container for Cisco IOS XE.
RAT Ratatouille – Backdooring PCs with leaked RATs
1 min read
Orcus RAT and RevengeRAT are two of the most popular remote access trojans (RATs) in use across the threat landscape. Since its emergence in 2016, various adversaries used RevengeRAT to...
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services