Security

Prev / Page 144

October 3, 2018

SECURITY

Vulnerability Spotlight: Google PDFium JBIG2 Image ComposeToOpt2WithRect Information Disclosure Vulnerability

1 min read

Discovered by Aleksandar Nikolic of Cisco Talos Overview Cisco Talos is releasing details of a new vulnerability in Google PDFium's JBIG2 library. An exploitable out-of-bounds read on the heap...

October 3, 2018

SECURITY

pxGrid 2.0 Context-In and Dynamic Topics Enable Collaborative Security

3 min read

With the new pxGrid 2.0 architecture, we have added a new capability that allows ISE to take in additional context for the purpose of classifying IoT devices.

October 3, 2018

SECURITY

Apple + Cisco + IBM = Next Level Mobile Security

2 min read

Now with IBM added to our partnership equation with Apple, mobile security with the Cisco Security Connector has never been better.

October 2, 2018

SECURITY

Cisco Named a 2018 Gartner Peer Insights Customers’ Choice for UTM

2 min read

Cisco is proud to announce that it was named a  2018 Gartner Peer Insights Customers’ Choice for Unified Threat Management.

October 2, 2018

SECURITY

BruCON Primer: 10 Years and Cisco Talos Talks

1 min read

Cisco Talos will have a significant presence at the 10th edition of BruCON, which kicks off this week. Below, you will find the presentations that Talos researchers will give, along...

October 2, 2018

SECURITY

Vulnerability Spotlight: Adobe Acrobat Reader DC Collab reviewServer Remote Code Execution Vulnerability

1 min read

Discovered by Aleksandar Nikolic of Cisco Talos Overview Today, Talos is releasing details of a new vulnerability within Adobe Acrobat Reader DC. Adobe Acrobat Reader is the most popular and...

October 1, 2018

SECURITY

Vulnerability Spotlight: Multiple Issues in Foxit PDF Reader

1 min read

Overview Cisco Talos is disclosing eightteen vulnerabilities in Foxit PDF Reader, a popular free program for viewing, creating and editing PDF documents. It is commonly used as an...

October 1, 2018

SECURITY

Your Email Security Toolbox: Defense in Depth

3 min read

Criminals know that easily-obtained data can help them craft a compelling attack campaign.  Here are some essential tools defenders must have to thwart these sophisticated attacks.

October 1, 2018

SECURITY

Vulnerability Spotlight: Multiple vulnerabilities in Atlantis Word Processor

1 min read

Atlantis Word Processor is a portable word processor that is also capable of converting any TXT, RTF, ODT, DOC, WRI, or DOCX document into an eBook in the ePub format.

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services