- Our Favorite Topics:
Vulnerability Spotlight: Apple Garage Band Out of Bounds Write Vulnerability
1 min read
Discovered by Tyler Bohan of Cisco Talos Overview Talos is disclosing TALOS-2016-0262 (CVE-2017-2372) and TALOS-2017-0275 (CVE-2017-2374), an out of bounds write vulnerability in Apple GarageBand. GarageBand is a music creation program, allowing users to create and edit music easily and effectively from their Mac computer. GarageBand is installed by default on all Mac computers so […]
The impact on network security through encrypted protocols – TLS 1.3
4 min read
This post is the second part of my series around the impact of encrypted protocols on network security. You can find the first article about HTTP/2 here: http://blogs.cisco.com/security/the-impact-on-network-security-through-encrypted-protocols-http2 Now let us focus on the new and upcoming specification of TLS 1.3. It is important to understand what advantages TLS 1.3 brings to us, but also […]
Staying Ahead of the Hack: Operationalizing Threat Intelligence to Strengthen Defenses
3 min read
Many pieces of forensic evidence come into play when investigating a crime scene – analysis of fingerprints, DNA, shoe prints, videos/photos, ballistics, etc. By analyzing the data, a picture of...
Indicators of Compromise and where to find them
4 min read
Indicators of Compromise (“IOC”) are used to suggest a system has been affected by some form of malware. An Indicator of Compromise can be anything from a file name to the behavior observed while malware is actively running on an infected system. Where do they look? Social media, new feeds, industry reports, Threat Grid sample […]
Cisco Coverage for ‘Ticketbleed’
1 min read
Vulnerability Details A vulnerability (CVE-2016-9244) was recently disclosed affecting various F5 products due to the way in which the products handle Session IDs when the non-default Session Tickets option is enabled. By manipulating the Session IDs provided to affected products, an attacker could potentially leak up to 31 bytes of uninitialized memory. This vulnerability can […]
The Transformation of the Cybersecurity Workforce
3 min read
When the commercial internet was young, IT structure was relatively simple. Today, though, growing complexity is one of IT’s biggest security challenges. The more complex the system, the greater the attack surface. It is much easier now to hide multi-pronged attacks in different layers and parts of the IT infrastructure. Virtual machines, BYOD, “-aaS” environments, […]
EPP? EDR? Cisco AMP for Endpoints is Next Generation Endpoint Security
4 min read
You may be wondering why Cisco AMP for Endpoints was not included in Gartner’s 2017 Magic Quadrant for Endpoint Protection Platforms (EPP). Traditionally, Gartner placed Cisco AMP for Endpoints within their Endpoint Detection and Response (EDR) category of endpoint security tools. But as buyer needs evolve, so does the market category. In fact, looking at […]
Introducing Cisco Umbrella, the industry’s first Secure Internet Gateway in the cloud
2 min read
If your job is anything like mine, you find yourself using a wide range of SaaS-based applications. Today alone, I found myself using Salesforce.com, WebEx, Workday, Spark, Office 365, Box, JIRA, Trello, SmartSheets, and Google Docs. And I’m not even counting some of the things I use for fun: Spotify, Netflix, and Instagram. Every company […]
Go RAT, Go! AthenaGo points “TorWords” Portugal
1 min read
This post was authored by Edmund Brumaghin with contributions from Angel Villegas Summary Talos is constantly monitoring the threat landscape in an effort to identify changes in the way attackers are attempting to target organizations around the world. We identified a unique malware campaign that was distributed via malicious Word documents. The campaign appeared to […]
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services
2