Security

Prev / Page 207

March 2, 2017

SECURITY

Short on Security Resources? Try These Force Multipliers

3 min read

One in four organizations are exposed for six months or longer due to a lack of qualified security workers. And in Europe almost one-third of cyber security job openings remain unfilled. That’s the challenging picture reported by ISACA at this year’s RSA Conference. You’re thinking, “tell me something I don’t know.” The Benchmark study in […]

February 27, 2017

SECURITY

Cisco PSIRT – Mitigating and Detecting Potential Abuse of Cisco Smart Install Feature

5 min read

A Cisco Security Response alerts about possible abuse of the Smart Install feature. While not considered a vulnerability, the Response provides guidance on how to protect their networks against abuse.

February 27, 2017

SECURITY

Cisco Coverage for Smart Install Client Protocol Abuse

1 min read

Summary Talos has become aware of active scanning against customer infrastructure with the intent of finding Cisco Smart Install clients. Cisco Smart Install is one component of the Cisco Smart Operations solution that facilitates the management of LAN switches. Research has indicated that malicious actors may be leveraging detailed knowledge of the Smart Install Protocol to […]

February 27, 2017

SECURITY

Vulnerability Spotlight: Multiple remote code execution vulnerabilities in Iceni Argus PDF Content Extraction affect Mar …

1 min read

Overview Talos has discovered multiple vulnerabilities in Iceni Argus PDF content extraction product. Exploiting these vulnerabilities can allow an attacker to gain full control over the victim’s machine. Although the main product is deprecated by Iceni, the library is still supported. Iceni has released a patched version that addresses these vulnerabilities. Nevertheless, the library is […]

February 23, 2017

SECURITY

Korean MalDoc Drops Evil New Years Presents

1 min read

Talos investigated a targeted malware campaign against South Korean users, based on a Hangul Word Processor document (HWP), a popular alternative to Microsoft Office for South Korean users developed by Hancom.

February 23, 2017

SECURITY

Serenity Now! A better way to malware analysis.

2 min read

Over the last half decade the term sandboxing has become so pervasive, many customers I speak to have forgotten what it’s for!  Sandboxing is a type of malware analysis – dynamic malware analysis to be exact. You execute a sample / file in a virtual environment and see what happens. There are numerous other types […]

February 22, 2017

SECURITY

Cisco Firepower 2100 Series Delivers Business Resiliency and Effective Security with a New Architectural Approach

2 min read

Business resiliency is job one for network operations teams. With our latest Firepower 2100 Series NGFWs, Cisco is helping our customers maintain network performance while they keep their data safe.

February 21, 2017

SECURITY

Vulnerability Spoltlight: Multiple Vulnerabilities in the Aerospike NoSQL Database Server

1 min read

Vulnerabilities discovered by Talos Talos is releasing multiple vulnerabilities discovered in the Aerospike Database Server. These vulnerabilities range from Denial of Service to potential remote code execution. This software is used by various companies that require a high performance NoSQL database. These issues have been addressed in version 3.11.1.1 of the Aerospike Database software.  The […]

February 20, 2017

SECURITY

A Comparison of SOC Models for Today’s Need of Monitoring & Detecting the Latest Cyber Threats

4 min read

At Cisco, we are often asked to take a vendor agnostic approach when developing a Security Operations Center (SOC) strategy, and as such, we must consider the importance of distinguishing between the various types of SOC models in today’s demanding security needs. However, before explaining the various models that exist for today’s need of monitoring […]

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services