Security

Prev / Page 218

October 13, 2016

SECURITY

LockyDump – All Your Configs Are Belong To Us

1 min read

      Locky has continued to evolve since its inception in February 2016. This has made it difficult to track at times due to changes in the way in which it’s distributed as well as various characteristics of the malware itself. The actors responsible for Locky have continuously attempted to improve operational security (OpSec) […]

October 11, 2016

SECURITY

Microsoft Patch Tuesday – October 2016

1 min read

Patch Tuesday has once again arrived! Microsoft’s monthly release of security bulletins to address vulnerabilities provides fixes for 37 newly disclosed security flaws. Today’s release sees a total of 10 bulletins with five of the bulletins rated critical, addressing vulnerabilities in Edge, Graphics Component, Internet Explorer, Video Control, and Adobe Flash Player. Four bulletins are […]

October 10, 2016

SECURITY

Cybersecurity Awareness Begins – and Ends – with Employees

3 min read

People are a core component of an organization’s protection efforts, and organizations should place employees at the center of their security efforts.

October 6, 2016

SECURITY

Phishing for Threat Intelligence: Using Your Spam Quarantine for the Greater Good

3 min read

Cisco’s OpenDNS enables phishing awareness by helping organizations learn about commonly identifiable tactics used by scammers.

October 4, 2016

SECURITY

ETSI/IQC’s 4th Workshop on Quantum-Safe Cryptography

2 min read

Quantum computers could break commonly used public key algorithms, which would affect cryptography used today. For that reason, there has been great attention on quantum safe crypto recently. We have blogged about it in numerous occasions [1], [2] , [3]. In that context, last week the 4th ETSI/IQC on Quantum-Safe Cryptography in Toronto, Canada brought […]

October 3, 2016

SECURITY

Simpler NGFW Management – Lets You Get Home in Time for Dinner

3 min read

Firepower Device Manager makes NGFW connectivity and protection as fast and easy as deploying routers and switches.

October 3, 2016

SECURITY

Vulnerability Spotlight: FreeImage Library XMP Image Handling Code Execution Vulnerability

1 min read

Exploit uses a maliciously crafted image file as an email attachment or via an instant message.

September 30, 2016

SECURITY

Vulnerability Spotlight: OpenJPEG JPEG2000 mcc record Code Execution Vulnerability

1 min read

Vulnerability discovered by Aleksandar Nikolic of Cisco Talos Overview Talos has identified an exploitable out-of-bounds vulnerability in the JPEG 2000 image file format parser implemented in OpenJPEG library (TALOS-2016-0193/CVE-2016-8332). The JPEG 2000 file format is commonly used for embedding images inside PDF documents. This particular vulnerability could allow an out-of-bound heap write to occur, resulting […]

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services