Simpler NGFW Management – Lets You Get Home in Time for Dinner
Firepower Device Manager makes NGFW connectivity and protection as fast and easy as deploying routers and switches.
Vulnerability Spotlight: FreeImage Library XMP Image Handling Code Execution Vulnerability
Exploit uses a maliciously crafted image file as an email attachment or via an instant message.
Cybersecurity Now and In the Future – Our Shared Responsibility
This year’s Cyber Security Awareness Month theme – Our Shared Responsibility – underscores how we must all be responsible, accountable, and work together to improve our online safety and security.
Vulnerability Spotlight: OpenJPEG JPEG2000 mcc record Code Execution Vulnerability
Vulnerability discovered by Aleksandar Nikolic of Cisco Talos Overview Talos has identified an exploitable out-of-bounds vulnerability in the JPEG 2000 image file format parser implemented in OpenJPEG library (TALOS-2016-0193/CVE-2016-8332). The JPEG 2000 file format is commonly used for embedding images inside PDF documents. This particular vulnerability could allow an out-of-bound heap write to occur, resulting […]
Want Tofsee My Pictures? A Botnet Gets Aggressive
This post was authored by Edmund Brumaghin Summary Tofsee is multi-purpose malware that has been in existence for several years, operating since at least 2013. It features a number of modules that are used to carry out various activities such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Once infected, systems become […]
Using Cisco Umbrella with Cisco WSA and Splunk for private reporting
Sometimes having a effective and innovative solution goes in a confrontation with the local country requirements. Especially when we want to deploy as cloud based security service. Using a cloud security service will one the one hand address quite nicely the need for better security and easy deployment , on the other hand a CxO […]
Going back to school on IoT security – personal reflections from a cybersecurity product marketeer
Has anybody ever actively encouraged you to hack your own car? Did you know that hacking your car could mean diagnosing problems easily and for a lower cost than you would find at the local dealer? Did you know that the aviation industry has built in both safety and security from the ground up? How […]
September 2016 Cisco IOS & IOS XE Software Bundled Publication
Today, we released the last Cisco IOS & IOS XE Software Security Advisory Bundled Publication of 2016. (As a reminder, Cisco discloses vulnerabilities in Cisco IOS and IOS XE Software on a predictable schedule—the fourth Wednesday of March and September in each calendar year). Today’s edition of the Cisco IOS & IOS XE Software Security Advisory […]
Creating a “Kill Switch” in the Cybersecurity “Kill Chain”
“Kill chain,” a cybersecurity term coined by Lockheed Martin, is shorthand for how cyber criminals target, recon, develop, and eventually penetrate their targets. It’s among the hottest buzzwords in the cybersecurity industry right now, with many security products talking about how they address the kill chain. But playing buzzword bingo in tech often results in […]
Why Cisco Security?
Explore our Products & Services
Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security