Security

Prev / Page 169

March 1, 2018

SECURITY

Vulnerability Spotlight: Simple DirectMedia Layer’s SDL2_Image

1 min read

Overview Talos is disclosing several vulnerabilities identified in Simple DirectMedia Layer's SDL2_Image library that could allow code execution. Simple DirectMedia Layer is a cross-platform development library designed to provide low...

March 1, 2018

SECURITY

Vulnerability Spotlight: Dovecot out-of-bounds Read Vulnerability

1 min read

Overview Today, Cisco Talos is disclosing a single out-of-bounds read vulnerability in the Dovecot IMAP server. Dovecot is a popular internet message access protocol, or IMAP, server...

March 1, 2018

SECURITY

Debunking the myths of DNS security

3 min read

For years, we’ve been pioneering the use of DNS to enforce security. We recognized that DNS was often a blind spot for organizations and that using DNS to enforce security...

February 28, 2018

SECURITY

CannibalRAT targets Brazil

1 min read

Malware continues to evolve in different ways and forms, one of which is the language it is written in, from Visual C++, to Powershell, almost everything has been used to...

February 28, 2018

SECURITY

The Power of Logging in Incident Response

4 min read

A deep dive into logging as an often-overlooked but powerful tool for incident detection and response “Lack of instrumentation or insufficient logging” is often a phrase used on incident response...

February 27, 2018

SECURITY

Curiosity, Exploration and Community – How I Paved my Own Path to a Cybersecurity Career

3 min read

I like to say that I didn’t really choose a career in cybersecurity – it chose me. The field naturally suits my personality, which has always been safety conscious. My...

February 26, 2018

SECURITY

Who Wasn’t Responsible for Olympic Destroyer?

1 min read

This blog post is authored by Paul Rascagneres and Martin Lee. Summary Evidence linking the Olympic Destroyer malware to a specific threat actor group is contradictory, and does not allow...

February 23, 2018

SECURITY

Vulnerability Spotlight: Adobe Acrobat Reader DC Document ID Remote Code Execution Vulnerability

1 min read

Talos is releasing details of a new vulnerability within Adobe Acrobat Reader DC.

February 19, 2018

SECURITY

Have Your Cake and Eat it Too With Next-Generation Endpoint Security from Cisco

2 min read

When faced with an either/or situation, people typically prefer not to choose. We want the best of both worlds. Rarely does someone want peanut butter OR jelly. Have cake? You...

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services