Checkrain fake iOS jailbreak leads to click fraud
Attackers are capitalizing on the recent discovery of a new vulnerability that exists across legacy iOS hardware. Cisco Talos recently discovered a malicious actor using a fake website that claims...
New Forensic Investigation Procedures for First Responder Guides
Cisco announces a new series of guides that help customers and partners triage Cisco products that are suspected of being tampered with or compromised.
On-Box Python for Cisco Devices – the Why, What, and How
Network automation with Python is now a major focus. Learn how to use Python scripts hosted on the box and integrated into IOS.
Automating Your Network Operations, Part 1 – Ansible Basics
New blog series gets you beyond the hype and simple demonstrations, and lets you dive more deeply into how and why to automate your network operations.
Advanced Mobile Malware Campaign in India uses Malicious MDM – Part 2
This blog post is authored by Warren Mercer and Paul Rascagneres and Andrew Williams. Summary Since our initial post on malicious mobile device management (MDM) platforms, we have gathered...
Advanced Mobile Malware Campaign in India uses Malicious MDM
Cisco Talos has identified a highly targeted campaign against 13 iPhones which appears to be focused on India. The attacker deployed an open-source mobile device management (MDM) system to control enrolled devices.
Best Security Practices for Fog Computing
For several years now, Cisco has been advocating for Fog Computing as an essential element of a scalable, reliable and cost effective IoT architecture.
Completely Changing the Way Your Network Runs
When Cisco makes a new product announcement, it's usually a big splash in the industry. #CiscoDNA
Apple and Cisco Partnership Continues to Deliver Great User Experiences for Mobile Users
In a second round of Networking Innovations, our partnership takes the guesswork out of Network Analytics and Assurance.