Security

Prev / Page 183

October 13, 2017

SECURITY

Cybersecurity is Everyone’s Responsibility: 5 ways to turbo charge your security practices

2 min read

This post was authored by Scott Garrett, GSSO, Cisco and Matt Gyde, Group Executive Security, Dimension Data. The speed at which we operate in a mobile world can result in...

October 12, 2017

SECURITY

Taking the Necessary Cybersecurity Steps Forward with Federal Government Programs

2 min read

As government agencies begin deploying cloud solutions and strategizing to meet cloud IT modernization mandates, a question arises – what will the future of the agency look like when they...

October 12, 2017

SECURITY

Disassembler and Runtime Analysis

1 min read

This post was authored by Paul Rascagneres. Introduction In the CCleaner 64bit stage 2 previously described in our blog, we explained that the attacker modified a legitimate executable that is part of “Symantec Endpoint”. This file is named EFACli64.dll. The modification is performed in the runtime code included by the compiler, more precisely in the […]

October 11, 2017

SECURITY

Spoofed SEC Emails Distribute Evolved DNSMessenger

1 min read

This post was authored by Edmund Brumaghin, Colin Grady, with contributions from Dave Maynor and @Simpo13. Executive Summary Cisco Talos previously published research into a targeted attack that leveraged an interesting infection process using DNS TXT records to create a bidirectional command and control (C2) channel. Using this channel, the attackers were able to directly […]

October 11, 2017

SECURITY

Security in Your DNA: Tips for Securing Your Network

3 min read

Cisco Stealthwatch and Identity Services Engine (ISE) are key components required to transform your network into a sensor capable of enforcing your security policies. But how do you incorporate automation...

October 11, 2017

SECURITY

How is a Stateful Firewall like a Vintage Porsche?

4 min read

“Dad, I love your vintage Porsche! But is it safe?” This is the conversation my 90-year old neighbor recently had with his adult children. The Porsche he inherited from his late father-in-law is a thing of beauty –  sleek, classic body, and driven once or twice a week. The low-mileage 911 has been maintained meticulously […]

October 10, 2017

SECURITY

Phish? Everyone’s on the hook.

2 min read

There’s no doubt that general awareness for cybersecurity has been on the rise in recent years. The importance of using strong passwords, for example, is now common knowledge. But one...

October 10, 2017

SECURITY

Microsoft Patch Tuesday – October 2017

1 min read

Microsoft has released its monthly set of security advisories for vulnerabilities that have been identified and addressed in various products. This month’s advisory release addresses 63 new vulnerabilities with 28 of them rated critical and 35 rated important. These vulnerabilities impact Graphics, Edge, Internet Explorer, Office, Sharepoint, Windows Graphic Display Interface, Windows Kernel Mode Drivers, […]

October 10, 2017

SECURITY

Vulnerability Spotlight: Arbitrary Code Execution Bugs in Simple DirectMedia Layer Fixed

1 min read

Today, Talos is disclosing two vulnerabilities that have been identified in the Simple DirectMedia Layer library. Simple DirectMedia Layer (SDL) is a cross-platform development library designed for use in video playback software, emulators, and games by providing low level access to audio, keyboard, mouse, joystick, and graphics hardware. SDL, via its SDL_image library, also has […]

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services