Shellshock Exploits in the Wild

This post was authored by Joel Esler & Martin Lee. The recently discovered Bash vulnerability (CVE-2014-6271) potentially allows attackers to execute code on vulnerable systems. We have already blogged about the issue and provided more technical detail in a further blog. The rapid release of IPS signatures for our platforms allowed us to follow very […]

Threat Trends: Firewall

Firewalls are a key component of any perimeter defense —the proverbial guard towers in your fortifications. Here, we examine the top threats encountered by Cisco Secure Firewall, and the Secure IPS component and Snort rules used control and inspect the traffic on the network.