Security

Prev / Page 132

January 2, 2019

SECURITY

Vulnerability Spotlight: Multiple privilege escalation vulnerabilities in CleanMyMac X

1 min read

Tyler Bohan of Cisco Talos discovered several vulnerabilities in MacPaw’s CleanMyMac X software, a cleanup application for Mac operating systems that allows users to free up space on their machines.

December 21, 2018

SECURITY

Threat Roundup for Dec. 14 to Dec. 21

1 min read

Summary of threats observed between December 14-21. Our customers are automatically protected from these threats, but we highlight key behavioral characteristics and indicators of compromise (not in-depth analysis).

December 21, 2018

SECURITY

Submissions for talks at the 2019 Talos Threat Research Summit are now open

1 min read

Cisco Talos is happy to announce that the Talos Threat Research Summit is returning in 2019. This time, we are expanding the number of attendees to 500 — double what we...

December 21, 2018

SECURITY

Talos’ Malware Year in Review

1 min read

It was easy to see a wild year coming in cybersecurity. It started with a bang, with Olympic Destroyer targeting the Winter Olympics in February in an attempt to disrupt...

December 21, 2018

SECURITY

Cisco ISE – Playing Nice in the Security Ecosystem

5 min read

2005 has long come and gone, and in this day and age, segmenting traffic on your network should mean more than a separate voice and data VLAN. 

December 20, 2018

SECURITY

Three ways to detect cryptomining activities using network security analytics

4 min read

Looking back at 2018, malicious cryptomining emerged as one of the most prominent threats. As described in-depth in this blog, cryptocurrency mining, or cryptomining for short, is the process...

December 20, 2018

SECURITY

The Greatest Gap in Securing Critical Infrastructure

4 min read

By practicing incident response plans you’ll decrease the time it takes to respond appropriately and recover from a real incident.

December 18, 2018

SECURITY

Cisco Threat Response: Open Source Integrations You Can Use Now

1 min read

Cisco Threat Response is built upon a collection of APIs; which can be used to integrate your Cisco and third-party security products, automate the incident response process and manage...

December 18, 2018

SECURITY

As Cryptocurrency Crash Continues, Will Mining Threat Follow?

1 min read

Post authored by Nick Biasini. Executive Summary As 2018 draws to a close, one technology has definitively left its...

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services