Security

Prev / Page 181

October 31, 2017

SECURITY

Vulnerability Spotlight: Multiple Vulnerabilities in Cesanta Mongoose Server

1 min read

These vulnerabilities were discovered by Aleksandar Nikolic of Cisco Talos Today, Talos is disclosing several vulnerabilities that have been identified in Cesanta Mongoose server. Cesanta Mongoose is a library implementing a number of networking protocols, including HTTP, MQTT, MDNS and others. It is designed with embedded devices in mind and as such is used in […]

October 27, 2017

SECURITY

Threat Round Up for Oct 20 – Oct 27

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between October 20 and October 27. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

October 27, 2017

SECURITY

Filling the Cybersecurity Professionals Gap – with Women

2 min read

Due to the high-profile data breaches, cybersecurity has become a household word. Think back to just one month ago, when the data breach at Equifax exposed the personal information for...

October 26, 2017

SECURITY

Data Center Application Layer Attacks

2 min read

There have been a number of articles written on data center outages and their business costs of lost productivity, infrastructure damage, loss of brand reputation and goodwill in the marketplace, and litigation costs.  Data center outages can occur from a number of factors such as such as component quality issues, power supply disturbances, or human […]

October 26, 2017

SECURITY

Vulnerability Spotlight: Apache OpenOffice Vulnerabilities

1 min read

Today, Talos is releasing details of three new vulnerabilities discovered within Apache OpenOffice application. The first vulnerability, TALOS-2017-0295 within OpenOffice Writer, the second TALOS-2017-0300 in the Draw application, and the third TALOS-2017-0301 discovered in the Writer application. All three vulnerabilities allow arbitrary code execution to be performed. Read More >>

October 25, 2017

SECURITY

Gartner releases report on the transformation of the SWG market

1 min read

On September 12, Gartner – the leading research and advisory company – released a competitive report on the secure web gateway (SWG) market. The report highlights the significant transformation as the traditional SWG gives way to a new platform –– the secure internet gateway (SIG). Gartner states, “the SIG service platform offers a new promise to […]

October 25, 2017

SECURITY

How to Quickly Differentiate Between Malicious and Harmless Traffic Using the Cisco Security Packet Analyzer

3 min read

With the constant news headlines about data theft it is mandatory that organizations understand what data is entering, traversing, and leaving their networks and have the ability to examine that data if necessary for conducting network forensic investigations.  Two popular style of attacks that are constantly in the news are data hoarding (Edward Snowden) and […]

October 25, 2017

SECURITY

Fireproofing your network with software-defined segmentation

5 min read

We often hear of the many challenges of the industrial revolution, but one of the scourges of this time period that often goes unmentioned was mass fires. To the people of the time, great fires threatened the very viability of industrialization. The number of fires bearing the moniker ‘great’ helps prove this point: The 1835 […]

October 24, 2017

SECURITY

Threat Spotlight: Follow the Bad Rabbit

1 min read

Note: This blog post discusses active research by Talos into a new threat. This information should be considered preliminary and will be updated as research continues. On October 24, 2017, Cisco Talos was alerted to a widescale ransomware campaign affecting organizations across eastern Europe and Russia. As was the case in previous situations, we quickly […]

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services