You already own the most powerful security tool. Are you really using it? Really?
See and stop threats using your existing network. If you live in the United States, there’s a 44% chance your most valuable personal data were recently compromised. The silver lining, if there is one, is that this breach compelled many to start actively monitoring their credit report for signs of suspicious activity. It often takes […]
Introducing a New Addition to Cisco’s Security Impact Rating
The Cisco Product Security Incident Response Team (PSIRT) is introducing a new Security Impact Rating (SIR) for Cisco Security Advisories: Informational.
Vulnerability Walkthrough: 7zip CVE-2016-2334 HFS+ Code Execution Vulnerability
This blog post was authored by Marcin Noga of Cisco Talos. Introduction In 2016 Talos released an advisory for CVE-2016-2334, which was a remote code execution vulnerability affecting certain versions of 7zip, a popular compression utility. In this blog post we will walk through the process of weaponizing this vulnerability and creating a fully working […]
CMS Brute Force Attacks Are Still a Threat
Brute force attacks have existed long before the Internet. As a cryptanalytic attack, it started being used as an attempt to access encrypted data when there were no other options available. With...
Improving Cybersecurity in Healthcare Part II: Control
The Internet of Things (IoT) is ushering in an exciting digital renaissance that is redefining the traditional models of how healthcare is delivered. With IoT devices such as smart infusion pumps or connected inhalers, healthcare providers can now remotely monitor and adjust care. IoT devices in healthcare, where mobile and wearable devices are increasingly connected […]
Dissecting a Breach: The Process of Incident Response
On December 5, 2017, at 1 pm Eastern, Cisco Security Incident Response Service experts will present a webinar titled “Dissecting a Breach: An Incident Responder’s Perspective.” This webinar will describe how our team performs incident handling within the service and what you should expect during any incident engagement, regardless of who is doing the work. We […]
Cisco Stealthwatch Cloud Announces Support for AWS PrivateLink
Cisco Stealthwatch Cloud recently launched as a fully procurable SaaS service available on AWS Marketplace. As a security service available on Amazon Web Services (AWS), Stealthwatch Cloud provides security monitoring, visualization, and automatic threat detection. Stealthwatch Cloud uses advanced modeling and machine learning techniques to identify behavior changes in AWS provisioned entities. Stealthwatch Cloud learns […]
4 Key Questions To Determine If Your Endpoint Security Is Up To Snuff
Machine learning. Next-generation antivirus. Artificial intelligence. These are all terms you likely see in your inbox on a daily basis from various endpoint security vendors. Meanwhile, you’re trying to protect your business and don’t have time to assess the 50+ vendors touting the latest tool designed to solve all of your endpoint security problems and […]
This post was authored by Warren Mercer, Paul Rascagneres and with contributions from Jungsoo An. Earlier this year, Talos published 2 articles concerning South Korean threats. The first one was about the use of a malicious HWP document which dropped downloaders used to retrieve malicious payloads on several compromised websites. One of the website was a compromised government website. We […]
Why Cisco Security?
Explore our Products & Services
Get Security Blogs via Email
Stay up to date and get the latest blogs from Cisco Security