Security

Prev / Page 206

March 10, 2017

SECURITY

Threat Roundup for the Week of Mar 6 – Mar 10

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed over the past week. As with our previous threat round-up, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

March 9, 2017

SECURITY

Three Essential Elements of a Reliable Cyber Resilience Strategy

3 min read

Next week’s NCSA Nasdaq Cybersecurity Summit in New York will focus government and private sector leaders on two priorities—developing a strategic approach to combating pervasive cyber threats and creating a culture of cybersecurity across enterprises. These are critical issues that Cisco is addressing head-on, and we are excited and proud to be a part of […]

March 9, 2017

SECURITY

Vulnerability Spotlight: R – PDF LoadEncoding Code Execution Vulnerability

1 min read

Vulnerability Discovered by Cory Duplantis of Cisco Talos Overview Talos is disclosing TALOS-2016-0227 / CVE-2016-8714 which is a buffer overflow vulnerability in the LoadEncoding functionality of the R programming language version 3.3.0. The R programming language is commonly used in statistical computing and is supported by the R Foundation for Statistical Computing. R is praised […]

March 8, 2017

SECURITY

Content-Type: Malicious – New Apache Struts2 0-day Under Attack

1 min read

This Post Authored by Nick Biasini UPDATE: It was recently disclosed that in addition to Content-Type being vulnerable, both Content-Disposition and Content-Length can be manipulated to trigger this particular vulnerability. No new CVE was listed, however details of the vulnerability and remediation are available in this security advisory. Talos has observed a new Apache vulnerability […]

March 8, 2017

SECURITY

Crypt0l0cker (TorrentLocker): Old Dog, New Tricks

1 min read

Ransomware continues to be a plague on the internet and still sets itself as the fastest growing malware family we have seen in the last number of years. In this post we describe the technical details about a newly observed campaign of the notorious Crypt0l0cker (aka TorrentLocker or Teerac) ransomware. Crypt0l0cker has gone through a […]

March 7, 2017

SECURITY

The Wikileaks Vault 7 Leak – What We Know So Far

3 min read

UPDATE: March 17, 2017 Based on the “Vault 7” public disclosure, Cisco launched an investigation into the products that could potentially be impacted by these and similar exploits and vulnerabilities. As part of the internal investigation of our own products and the publicly available information, Cisco security researchers found a vulnerability in the Cluster Management […]

March 3, 2017

SECURITY

Malware Round-up For The Week of Feb 27 – Mar 3

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed over the past week. Unlike our other posts, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically protected from […]

March 3, 2017

SECURITY

The IoT(s): One Size Does Not Fit All

3 min read

Today let’s talk about IoT as a plurality. I suspect that you may have recently heard the phrase that “words matter,” and when talking about something as broad and diverse as “IoT” it really does indeed matter. It matters because correctly defining what you are speaking about, and to whom, will help to drive towards […]

March 2, 2017

SECURITY

Covert Channels and Poor Decisions: The Tale of DNSMessenger

1 min read

This post was authored by Edmund Brumaghin and Colin Grady Executive Summary The Domain Name System (DNS) is one of the most commonly used Internet application protocols on corporate networks. It is responsible for providing name resolution so that network resources can be accessed by name, rather than requiring users to memorize IP addresses. While […]

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services