Three Things Businesses Can Do to Protect Data Privacy
Today, protecting data privacy is a must. Companies must demonstrate how they are protecting data privacy to earn the trust of global customers, users, partners and employees.
The Many Tentacles of the Necurs Botnet
This post was written by Jaeson Schultz. Introduction Over the past five years the Necurs botnet has established itself as the largest purveyor of spam worldwide. Necurs is responsible for emailing massive amounts of banking malware, ransomware, dating spam, pump-n-dump stock scams, work from home schemes, and even cryptocurrency wallet credential phishing. Necurs sends so much […]
Who Is Managing Our Data Assets?
Most organizations have people or teams to optimally manage their valuable corporate assets. Real estate teams manage and optimize the use of space. IT manages the technology. Same with inventory, cash and investments, and people resources. Even intangibles like patents and other intellectual property. But with data – arguably one of our most valuable resources […]
Vulnerability Spotlight: Tinysvcmdns Multi-label DNS DoS Vulnerabilility
Overview Talos is disclosing a single NULL pointer dereference vulnerability in the tinysvcmdns library. Tinysvcmdns is a tiny MDNS responder implementation for publishing services. This is essentially a mini and embedded version of Avahi or Bonjour. Read More >>
Broadening the Art of the Possible Through Diversity
During a recent conversation with an industry peer and great friend, he asked, “How did you make Cisco’s Security and Trust Organization so inclusive and diverse?” The question made me...
Security Challenges and Opportunities: The Security Day at Cisco Live in Barcelona on 29th January
Join us in Barcelona for the latest threat intelligence information and demonstrations on how we help our customers stop more threats, respond faster and use automation to bolster their security posture.
Vulnerability Spotlight: Multiple Unpatched Vulnerabilities in Blender Identified
Talos discloses multiple vulnerabilities identified in Blender that could allow an attacker to execute arbitrary code. Blender. Users opening a crafted file could trigger a vulnerability and be exploited or compromised.
Vulnerability Spotlight: Ruby Rails Gem XSS Vulnerabilities
Talos has discovered two XSS vulnerabilities in Ruby Rails Gems. Rails is a Ruby framework designed to create web services or web pages. Ruby Gems is a package manager for distributing software packages as ‘gems’. The two XSS vulnerabilities were discovered in two different gem packages: delayed_job_web and rails_admin. Ruby is widely used as a […]
Why Cisco Security?
Explore our Products & Services
Get Security Blogs via Email
Stay up to date and get the latest blogs from Cisco Security