Combatting Cybercrime with an Incident Response Plan

By Sean Mason Based on the cybersecurity news proliferating in the mainstream media today – from ransomware incidents to data breaches of massive proportions – it has become clear that organizations need to put security mechanisms in place to protect their IT infrastructure. Organizations commonly use anti-virus, firewall, intrusion prevention and other security technologies to protect themselves; but […]

Source:: Cisco Security Notice

Malicious Microsoft Office Documents Move Beyond InkPicture

By Ross Gibb In late August we began to detect malicious Microsoft Word documents that contained VisualBasic (VB) macro code and the code appeared to be triggering when the document was opened. However, the documents did not contain any of the standard events used to launch VB macro code when a document is opened, including Document_Open, or Auto_Open events. Upon […]

Source:: Cisco Security Notice

Malicious Microsoft Office Documents Move Beyond InkPicture

By Ross Gibb In late August we began to detect malicious Microsoft Word documents that contained VisualBasic (VB) macro code and the code appeared to be triggering when the document was opened. However, the documents did not contain any of the standard events used to launch VB macro code when a document is opened, including Document_Open, or Auto_Open events. Upon […]

Source:: Cisco Security Notice

Evolving Security Disclosures : The New OASIS Common Security Advisory Framework (CSAF) Technical Committee

By Omar Santos During the last few years we have witnessed how the cyber security threat landscape has evolved. The emergence of the Internet of Things combined with recent events have profoundly changed how we protect our systems and people, and drive us to think about new approaches for vendors to disclose security vulnerabilities to customers and consumers. […]

Source:: Cisco Security Notice

Evolving Security Disclosures : The New OASIS Common Security Advisory Framework (CSAF) Technical Committee

By Omar Santos During the last few years we have witnessed how the cyber security threat landscape has evolved. The emergence of the Internet of Things combined with recent events have profoundly changed how we protect our systems and people, and drive us to think about new approaches for vendors to disclose security vulnerabilities to customers and consumers. […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Hopper Disassembler ELF Section Header Size Code Execution

By Talos Group Vulnerability Discovered by Tyler Bohan and Cory Duplantis of Cisco Talos Talos has identified an exploitable out-of-bounds write vulnerability in the ELF Section Header parsing functionality of Hopper (TALOS-2016-0222/CVE-2016-8390). Hopper is a reverse engineering tool for macOS and Linux allowing the user to disassemble and decompile 32/64bit Intel-based Mac, Linux, Windows and iOS executables. During the parsing […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Hopper Disassembler ELF Section Header Size Code Execution

By Talos Group Vulnerability Discovered by Tyler Bohan and Cory Duplantis of Cisco Talos Talos has identified an exploitable out-of-bounds write vulnerability in the ELF Section Header parsing functionality of Hopper (TALOS-2016-0222/CVE-2016-8390). Hopper is a reverse engineering tool for macOS and Linux allowing the user to disassemble and decompile 32/64bit Intel-based Mac, Linux, Windows and iOS executables. During the parsing […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Foxit PDF Reader JBIG2 Parser Information Disclosure

By Talos Group Vulnerability discovered by Aleksandar Nikolic of Talos. Talos has identified an information disclosure vulnerability in Foxit PDF Reader (TALOS-2016-0201/CVE-2016-8334). A wrongly bounded call to `memcpy`, while parsing jbig2 segments within a PDF file, can be triggered in Foxit PDF Reader causing an out-of-bounds heap memory to be read into a buffer. The `memcpy` call is properly […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Foxit PDF Reader JBIG2 Parser Information Disclosure

By Talos Group Vulnerability discovered by Aleksandar Nikolic of Talos. Talos has identified an information disclosure vulnerability in Foxit PDF Reader (TALOS-2016-0201/CVE-2016-8334). A wrongly bounded call to `memcpy`, while parsing jbig2 segments within a PDF file, can be triggered in Foxit PDF Reader causing an out-of-bounds heap memory to be read into a buffer. The `memcpy` call is properly […]

Source:: Cisco Security Notice

Combating Email Spoofing with Cisco Email Security Forged Email Detection

By Raymond Jett In April we covered the description of Email Spoofing using Microsoft Outlook, but what about detecting and mitigating it on the Mail Transfer Agent (MTA)? There are multiple technologies that have attempted to address the issues surrounding spoofed emails on the MTA, but they all have shortcomings that can limit their usefulness. DKIM, or Domain […]

Source:: Cisco Security Notice