Vulnerability Spotlight: Multiple Vulnerabilities in InsideSecure MatrixSSL

By Talos Group These vulnerabilities were discovered by Aleksandar Nikolic of Cisco Talos Overview MatrixSSL is a TLS/SSL stack offered in the form of a Software Development Kit (SDK) that is geared towards application in Internet of Things (IOT) devices and other embedded systems. It features low resource overhead and supports many different embedded platforms. It also features […]

Source:: Cisco Security Notice

What is the Body Language of Your Encrypted Network Traffic Really Saying?

By TK Keanini Imagine this scenario – you walk into a meeting room with a colleague and they are sitting at the table with their arms crossed. You immediately think to yourself, this meeting is not going to go well, this person is already displeased with me and I have not said anything yet. However, you are making […]

Source:: Cisco Security Notice

What is the Body Language of Your Encrypted Network Traffic Really Saying?

By TK Keanini Imagine this scenario – you walk into a meeting room with a colleague and they are sitting at the table with their arms crossed. You immediately think to yourself, this meeting is not going to go well, this person is already displeased with me and I have not said anything yet. However, you are making […]

Source:: Cisco Security Notice

Cyber, APT und was Geheimdienste damit zu tun haben

Als Überraschungsredner der diesjährigen 10. Troopers Security Konferenz war der bekannte Hacker „The Grukq“ angereist.

Er beleuchtet die Bedrohungen im Rahmen von Wirtschaftsspionage, die mit Hilfe internationaler Geheimdienste durchgeführt wird. Insbesondere vergleicht er das sehr unterschiedliche Vorgehen der Dienste in den USA, China und Russland.

Was dabei herausgestellt werden kann ist, dass Unternehmen nicht aufgrund purer Größe in den Fokus geraten. Ausschlaggebend ist maßgeblich das entsprechende Know-How. Wenn z.B. die chinesische Führung anordnet, im Bereich Nanotechnologie in den nächsten fünf Jahren den weltweiten Spitzenplatz zu erobern, erfolgt die gezielte Infiltrierung und Gewinnung von Informationen bei denjenigen Unternehmen, deren Wissen und Forschungsergebnisse die eigene Wirtschaft anfordert. Das kann dann auch einen kleinen Mittelständler betreffen, der sich selbst als zu klein und zu bedeutungslos ansieht.

Eine sehr unterhaltsame Stunde mit „The Grukq“ können Sie hier (in englischer Sprache) anschauen:

 

Player 1 Limps Back Into the Ring – Hello again, Locky!

By Talos Group This post was authored by Alex Chiu, Warren Mercer, and Jaeson Schultz. Sean Baird and Matthew Molyett contributed to this post. Back in May, the Necurs spam botnet jettisoned Locky ransomware in favor of the new Jaff ransomware variant. However, earlier this month Kaspersky discovered a vulnerability within Jaff which allowed them to create a decryptor. […]

Source:: Cisco Security Notice

Player 1 Limps Back Into the Ring – Hello again, Locky!

By Talos Group This post was authored by Alex Chiu, Warren Mercer, and Jaeson Schultz. Sean Baird and Matthew Molyett contributed to this post. Back in May, the Necurs spam botnet jettisoned Locky ransomware in favor of the new Jaff ransomware variant. However, earlier this month Kaspersky discovered a vulnerability within Jaff which allowed them to create a decryptor. […]

Source:: Cisco Security Notice

Control Your Own Security

By John N. Stewart Digitization continues to change business at an amazing rate and in many ways. As business leaders around the world embrace ‘Digital‘ to simplify, automate, and deliver innovation, they’re no longer simply using Information Technology to run their businesses; IT is enabling it. IT is the vital lifeblood of a business and we must protect it […]

Source:: Cisco Security Notice

Control Your Own Security

By John N. Stewart Digitization continues to change business at an amazing rate and in many ways. As business leaders around the world embrace ‘Digital‘ to simplify, automate, and deliver innovation, they’re no longer simply using Information Technology to run their businesses; IT is enabling it. IT is the vital lifeblood of a business and we must protect it […]

Source:: Cisco Security Notice

Introducing Threat Grid for Meraki MX

By Lindsay van Gemert Back in July we announced the integration of Cisco Advanced Malware Protection with the Meraki MX. The AMP integration with the MX provided a simple and effective way for MX customers to detect, monitor and remediate advanced threats in their environment. We’re now taking this protection a step further with the integration of Threat Grid […]

Source:: Cisco Security Notice

Introducing Threat Grid for Meraki MX

By Lindsay van Gemert Back in July we announced the integration of Cisco Advanced Malware Protection with the Meraki MX. The AMP integration with the MX provided a simple and effective way for MX customers to detect, monitor and remediate advanced threats in their environment. We’re now taking this protection a step further with the integration of Threat Grid […]

Source:: Cisco Security Notice