- Our Favorite Topics:
Back to Basics: Worm Defense in the Ransomware Age
1 min read
This post was authored by Edmund Brumaghin “Those who cannot remember the past are condemned to repeat it.” – George Santayana The Prequel In March 2017, Microsoft released a security update for various versions of Windows, which addressed a remote code execution vulnerability affecting a protocol called SMBv1 (MS17-010). As this vulnerability could allow a […]
Vulnerability Spotlight: Multiple Gdk-Pixbuf Vulnerabilities
1 min read
Today, Talos is disclosing the discovery of two remote code execution vulnerabilities which have been identified in the Gdk-Pixbuf Toolkit. This toolkit used in multiple desktop applications including Chromium, Firefox, GNOME thumbnailer, VLC and others. Exploiting this vulnerability allows an attacker to gain full control over the victim’s machine. If an attacker builds a specially […]
Vulnerability Spotlight: Code Execution Vulnerability in LabVIEW
1 min read
LabVIEW is a system design and development platform released by National Instruments. The software is widely used to create applications for data acquisition, instrument control and industrial automation. Talos is disclosing the presence of a code execution vulnerability which can be triggered by opening specially crafted VI files, the proprietary file format used by LabVIEW. […]
Vulnerability Spotlight: Lexmark Perceptive Document Filters Code Execution Bugs
1 min read
Overview Talos is disclosing a pair of code execution vulnerabilities in Lexmark Perceptive Document Filters. Perceptive Document Filters are a series of libraries that are used to parse massive amounts of different types of file formats for multiple purposes. Talos has previously discussed in detail these filters and how they operate. The software update to […]
What’s in a Name? Threat Intelligence, Artificial Intelligence, and Extreme Snack Foods
3 min read
What is in a name? A lot, actually. A rose by any other name would certainly smell just as sweet. But if I sold you a dozen dandelions, calling them roses, as the perfect Valentine’s Day gift for your sweetheart, neither of you would be none too pleased, would you? It makes me think of […]
Here Are 3 Things that Drive Security for the Intuitive Network
3 min read
Hint: ISE 2.3 Plays Key Role We recently announced the Network Intuitive architecture, a new era of networking that removes complexity and enables automation, assurance, and security. With built-in...
Securing the IoT: Processes and People Needed!
2 min read
IoT promises to boost corporate profits worldwide by 21 percent by 2022, according to Cisco analysts. That’s because IoT can help businesses lower costs by realizing new efficiencies and drive new revenues by enabling new business models. Digital transformation in general, and IoT in particular, can help organizations become more productive and more responsive to […]
Take incident response to the next level with AMP for Endpoints and Cognitive Threat Analytics
5 min read
Our data shows that there are 5 to 10 breaches per 1000 seats every week. That number is staggering and exemplifies the limits of traditional prevention. Most of these attacks...
Adversaries’ New Strategy: Cyber Attacks Designed for Destruction, Not Just Disruption?
3 min read
As defenders, one of our key objectives is to help organizations and individual users understand the threat landscape so they can reduce their exposure to cyber threats. Our threat researchers and technology partners watch that ever-changing landscape very closely, as they have for many years now. That’s one reason we are confident when we say […]
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services