Recognized Excellence in Trustworthy Product Development and Pervasive Data Protection
Last week at RSA, the 2017 Info Security Products Guide Global Excellence Awards honored three teams from the Cisco Security and Trust Organization for their work in leading security practices.
Korean MalDoc Drops Evil New Years Presents
Talos investigated a targeted malware campaign against South Korean users, based on a Hangul Word Processor document (HWP), a popular alternative to Microsoft Office for South Korean users developed by Hancom.
Serenity Now! A better way to malware analysis.
Over the last half decade the term sandboxing has become so pervasive, many customers I speak to have forgotten what it’s for! Sandboxing is a type of malware analysis – dynamic malware analysis to be exact. You execute a sample / file in a virtual environment and see what happens. There are numerous other types […]
Cisco Firepower 2100 Series Delivers Business Resiliency and Effective Security with a New Architectural Approach
Business resiliency is job one for network operations teams. With our latest Firepower 2100 Series NGFWs, Cisco is helping our customers maintain network performance while they keep their data safe.
Vulnerability Spoltlight: Multiple Vulnerabilities in the Aerospike NoSQL Database Server
Vulnerabilities discovered by Talos Talos is releasing multiple vulnerabilities discovered in the Aerospike Database Server. These vulnerabilities range from Denial of Service to potential remote code execution. This software is used by various companies that require a high performance NoSQL database. These issues have been addressed in version 18.104.22.168 of the Aerospike Database software. The […]
A Comparison of SOC Models for Today’s Need of Monitoring & Detecting the Latest Cyber Threats
At Cisco, we are often asked to take a vendor agnostic approach when developing a Security Operations Center (SOC) strategy, and as such, we must consider the importance of distinguishing between the various types of SOC models in today’s demanding security needs. However, before explaining the various models that exist for today’s need of monitoring […]
RSA Conference 2017 Security Operations Center Wrap-Up
Effective Security requires three essential pillars: Simple to use, Open architecture and Automated workflows. The collaboration with RSA NetWitness Packets and Cisco AMP Threat Grid, in the RSA Conference 2017...
Cisco Coverage for ‘Magic Hound’
‘Magic Hound’ is the code name used to reference a seemingly limited series of malware distribution campaigns that were observed targeting organizations in Saudi Arabia as well as organizations with business interests in Saudi Arabia. Similar to other malware distribution campaigns that Talos has observed and documented, this series of campaigns made use of phishing […]
Vulnerability Spotlight: Apple Garage Band Out of Bounds Write Vulnerability
Discovered by Tyler Bohan of Cisco Talos Overview Talos is disclosing TALOS-2016-0262 (CVE-2017-2372) and TALOS-2017-0275 (CVE-2017-2374), an out of bounds write vulnerability in Apple GarageBand. GarageBand is a music creation program, allowing users to create and edit music easily and effectively from their Mac computer. GarageBand is installed by default on all Mac computers so […]
Why Cisco Security?
Explore our Products & Services
Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security