IOS
Black Hat USA 2023 NOC: Network Assurance
30 min read
The Black Hat Network Operations Center (NOC) provides a high security, high availability network in one of the most demanding environments in the world - the Black Hat event.
Cisco introduces Fastlane+ with advanced multi user scheduling to revolutionize real-time application experience
4 min read
Fastlane+ enhances the user experience for latency-sensitive voice and video applications in high-density user environments by improving the effectiveness of estimating the uplink buffer status for the supported Wi-Fi 6 capable iPhone and iPad.
Checkrain fake iOS jailbreak leads to click fraud
1 min read
Attackers are capitalizing on the recent discovery of a new vulnerability that exists across legacy iOS hardware. Cisco Talos recently discovered a malicious actor using a fake website that claims...
New Forensic Investigation Procedures for First Responder Guides
2 min read
Cisco announces a new series of guides that help customers and partners triage Cisco products that are suspected of being tampered with or compromised.
On-Box Python for Cisco Devices – the Why, What, and How
9 min read
Network automation with Python is now a major focus. Learn how to use Python scripts hosted on the box and integrated into IOS.
Automating Your Network Operations, Part 1 – Ansible Basics
3 min read
New blog series gets you beyond the hype and simple demonstrations, and lets you dive more deeply into how and why to automate your network operations.
Advanced Mobile Malware Campaign in India uses Malicious MDM – Part 2
1 min read
This blog post is authored by Warren Mercer and Paul Rascagneres and Andrew Williams. Summary Since our initial post on malicious mobile device management (MDM) platforms, we have gathered...
Advanced Mobile Malware Campaign in India uses Malicious MDM
1 min read
Cisco Talos has identified a highly targeted campaign against 13 iPhones which appears to be focused on India. The attacker deployed an open-source mobile device management (MDM) system to control enrolled devices.
Best Security Practices for Fog Computing
3 min read
For several years now, Cisco has been advocating for Fog Computing as an essential element of a scalable, reliable and cost effective IoT architecture.