- Our Favorite Topics:
Short on Security Resources? Try These Force Multipliers
3 min read
One in four organizations are exposed for six months or longer due to a lack of qualified security workers. And in Europe almost one-third of cyber security job openings remain unfilled. That’s the challenging picture reported by ISACA at this year’s RSA Conference. You’re thinking, “tell me something I don’t know.” The Benchmark study in […]
Cisco PSIRT – Mitigating and Detecting Potential Abuse of Cisco Smart Install Feature
5 min read
A Cisco Security Response alerts about possible abuse of the Smart Install feature. While not considered a vulnerability, the Response provides guidance on how to protect their networks against abuse.
Cisco Coverage for Smart Install Client Protocol Abuse
1 min read
Summary Talos has become aware of active scanning against customer infrastructure with the intent of finding Cisco Smart Install clients. Cisco Smart Install is one component of the Cisco Smart Operations solution that facilitates the management of LAN switches. Research has indicated that malicious actors may be leveraging detailed knowledge of the Smart Install Protocol to […]
Vulnerability Spotlight: Multiple remote code execution vulnerabilities in Iceni Argus PDF Content Extraction affect Mar …
1 min read
Overview Talos has discovered multiple vulnerabilities in Iceni Argus PDF content extraction product. Exploiting these vulnerabilities can allow an attacker to gain full control over the victim’s machine. Although the main product is deprecated by Iceni, the library is still supported. Iceni has released a patched version that addresses these vulnerabilities. Nevertheless, the library is […]
Korean MalDoc Drops Evil New Years Presents
1 min read
Talos investigated a targeted malware campaign against South Korean users, based on a Hangul Word Processor document (HWP), a popular alternative to Microsoft Office for South Korean users developed by Hancom.
Serenity Now! A better way to malware analysis.
2 min read
Over the last half decade the term sandboxing has become so pervasive, many customers I speak to have forgotten what it’s for! Sandboxing is a type of malware analysis – dynamic malware analysis to be exact. You execute a sample / file in a virtual environment and see what happens. There are numerous other types […]
Cisco Firepower 2100 Series Delivers Business Resiliency and Effective Security with a New Architectural Approach
2 min read
Business resiliency is job one for network operations teams. With our latest Firepower 2100 Series NGFWs, Cisco is helping our customers maintain network performance while they keep their data safe.
Vulnerability Spoltlight: Multiple Vulnerabilities in the Aerospike NoSQL Database Server
1 min read
Vulnerabilities discovered by Talos Talos is releasing multiple vulnerabilities discovered in the Aerospike Database Server. These vulnerabilities range from Denial of Service to potential remote code execution. This software is used by various companies that require a high performance NoSQL database. These issues have been addressed in version 3.11.1.1 of the Aerospike Database software. The […]
A Comparison of SOC Models for Today’s Need of Monitoring & Detecting the Latest Cyber Threats
4 min read
At Cisco, we are often asked to take a vendor agnostic approach when developing a Security Operations Center (SOC) strategy, and as such, we must consider the importance of distinguishing between the various types of SOC models in today’s demanding security needs. However, before explaining the various models that exist for today’s need of monitoring […]
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services
1