Security

Prev / Page 190

August 4, 2017

SECURITY

Threat Round-up for July 28 – August 4

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 28 and August 04. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

August 4, 2017

SECURITY

Vulnerability Spotlight: Kakadu SDK Vulnerabilities

1 min read

Vulnerabilities discovered by Aleksandar Nikolic and Tyler Bohan of Cisco Talos. Today, Talos is disclosing multiple vulnerabilities that have been identified in the Kakadu JPEG 2000 SDK. The vulnerabilities manifest in a way that could be exploited if a user opens a specifically crafted JPEG 2000 file. Talos has coordinated with Kakadu to ensure relevant […]

August 3, 2017

SECURITY

Taking the FIRST look at Crypt0l0cker

1 min read

This post is authored by Matthew Molyett. Executive Summary In March, Talos reported on the details of Crypt0l0cker based on an extensive analysis I carried out on the sample binaries. Binaries — plural — because, as noted in the original blog, the Crypt0l0cker payload leveraged numerous executable files which shared the same codebase. Those executables had nearly identical […]

August 3, 2017

SECURITY

Replace your AV with Next Generation Endpoint Security

3 min read

If you’ve been to a security conference in the last year you’ve probably seen more than 20 different vendors all talking about endpoint security. Some might be talking about next generation anti-virus, endpoint detection and response, and even the much lauded machine learning. How do you cut through the clutter and noise to find what […]

August 2, 2017

SECURITY

The Real IoT Opportunity for Enterprises? A Chance to Address Security Risks Head On

2 min read

IoT and IoT-related threats are very real. A massive compromise of IoT devices can severely disrupt not only organizations, but also the Internet itself. Fortunately, we are still in the early days of the IoT, which means there’s still time for defenders to do their part to help secure it.

August 2, 2017

SECURITY

Vulnerability Spotlight: EZB Systems UltraISO ISO Parsing Code Execution Vulnerability

1 min read

Discovered by Piotr Bania of Cisco Talos Today, Talos is releasing details of a new vulnerability discovered within the EZB Systems UltraISO ISO disk image creator software. TALOS-2017-0342 (CVE-2017-2840) may allow an attacker to execute arbitrary code remotely on the vulnerable system when a specially crafted ISO image is opened and parsed by the UltraISO […]

July 31, 2017

SECURITY

From the Trenches: 5 Ways Customers are Improving Security with Cisco AMP for Endpoints

3 min read

Does this sound like a day in your IT security life? Wake up, get coffee, drive to work, and battle an almost constant onslaught of attacks, while playing whack-a-mole with too many alerts. If so, we get it. You never know where the next attack will come from. And you’re probably on to the fact […]

July 27, 2017

SECURITY

Black Hat USA 2017: Cisco Umbrella Joins the NOC

4 min read

Cisco Cloud Based Security in the SOC Black Hat USA marked its 20th anniversary this year. The members of the NOC management showed me photos of the original NOC: a single router in a closet. The NOC has grown with the conference; into a well-managed team of experts from around the globe, from various vendors […]

July 26, 2017

SECURITY

How Adversaries Are Refining and Improving Ransomware in 2017

3 min read

Once adversaries have found a method for breaching network defenses, stealing data, or otherwise generating revenue, they’ll continue to refine these tactics to avoid detection and improve effectiveness. Ransomware, one of the more high-profile tools leveraged by adversaries, has undergone this same evolution, as we explain in the Cisco 2017 Midyear Cybersecurity Report. Delivery, obfuscation, […]

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services