Security

October 3, 2016

SECURITY

Simpler NGFW Management – Lets You Get Home in Time for Dinner

Firepower Device Manager makes NGFW connectivity and protection as fast and easy as deploying routers and switches.

October 3, 2016

THREAT RESEARCH

Vulnerability Spotlight: FreeImage Library XMP Image Handling Code Execution Vulnerability

Exploit uses a maliciously crafted image file as an email attachment or via an instant message.

October 3, 2016

SECURITY

Cybersecurity Now and In the Future – Our Shared Responsibility

This year’s Cyber Security Awareness Month theme – Our Shared Responsibility – underscores how we must all be responsible, accountable, and work together to improve our online safety and security.

September 30, 2016

THREAT RESEARCH

Vulnerability Spotlight: OpenJPEG JPEG2000 mcc record Code Execution Vulnerability

Vulnerability discovered by Aleksandar Nikolic of Cisco Talos Overview Talos has identified an exploitable out-of-bounds vulnerability in the JPEG 2000 image file format parser implemented in OpenJPEG library (TALOS-2016-0193/CVE-2016-8332). The JPEG 2000 file format is commonly used for embedding images inside PDF documents. This particular vulnerability could allow an out-of-bound heap write to occur, resulting […]

September 29, 2016

THREAT RESEARCH

Want Tofsee My Pictures? A Botnet Gets Aggressive

This post was authored by Edmund Brumaghin Summary Tofsee is multi-purpose malware that has been in existence for several years, operating since at least 2013. It features a number of modules that are used to carry out various activities such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Once infected, systems become […]

September 29, 2016

SECURITY

Using Cisco Umbrella with Cisco WSA and Splunk for private reporting

Sometimes having a effective and innovative solution goes in a confrontation with the local country requirements. Especially when we want to deploy as cloud based security service. Using a cloud security service will one the one hand address quite nicely the need for better security and easy deployment , on the other hand a CxO […]

September 29, 2016

SECURITY

Going back to school on IoT security – personal reflections from a cybersecurity product marketeer

Has anybody ever actively encouraged you to hack your own car?  Did you know that hacking your car could mean diagnosing problems easily and for a lower cost than you would find at the local dealer? Did you know that the aviation industry has built in both safety and security from the ground up? How […]

September 28, 2016

SECURITY

September 2016 Cisco IOS & IOS XE Software Bundled Publication

Today, we released the last Cisco IOS & IOS XE Software Security Advisory Bundled Publication of 2016. (As a reminder, Cisco discloses vulnerabilities in Cisco IOS and IOS XE Software on a predictable schedule—the fourth Wednesday of March and September in each calendar year).  Today’s edition of the Cisco IOS & IOS XE Software Security Advisory […]

September 28, 2016

SECURITY

Creating a “Kill Switch” in the Cybersecurity “Kill Chain”

“Kill chain,” a cybersecurity term coined by Lockheed Martin, is shorthand for how cyber criminals target, recon, develop, and eventually penetrate their targets.  It’s among the hottest buzzwords in the cybersecurity industry right now, with many security products talking about how they address the kill chain.  But playing buzzword bingo in tech often results in […]

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security