The Role of Visibility in SecOps
The bad guys aren’t going away. The good news is Next Generation Firewalls, Malware Protection, and Access Control are not only improving, but in some cases, working in concert together.
The bad guys aren’t going away. The good news is Next Generation Firewalls, Malware Protection, and Access Control are not only improving, but in some cases, working in concert together.
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between August 31 and September 7. As with previous round-ups, this post isn't meant to be an...
Cisco Talos has discovered two similar vulnerabilities in the ProtonVPN and NordVPN VPN clients that make it possible to execute code as an administrator on the system.
Overview Talos is disclosing multiple SQL injection vulnerabilities in the Frappe ERPNext Version 10.1.6 application. Frappe ERPNext is an open-source enterprise resource planning (ERP) cloud application. These vulnerabilities enable an...
Cisco Stealthwatch Cloud provides an unprecedented level of visibility and security analytic capabilities within a Kubernetes cluster. Here's how easy it is to deploy into an existing K8s cluster.
Since our initial discovery of a malicious mobile device management (MDM) platform that was loading fake applications onto smartphones, we have gained greater insight into the attacker's methods. We now...
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between August 24 and August 31. As with previous round-ups, this post isn't meant to be an...
The distinction between use case scenarios for standalone NGIPS vs. NGFW deployments can often be tricky to navigate.
Cryptocurrency miners are becoming an increasingly significant part of the threat landscape.
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Explore our Products & Services