Vulnerability Spotlight: FreeRDP Multiple Vulnerabilities

By Talos Group Talos has discovered multiple vulnerabilities in the FreeRDP product. FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) originally developed by Microsoft. RDP allows users to connect remotely to systems so they can be operated from afar. The open source nature of the FreeRDP library means that it is integrated […]

Vulnerability Spotlight: FreeRDP Multiple Vulnerabilities

By Talos Group Talos has discovered multiple vulnerabilities in the FreeRDP product. FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) originally developed by Microsoft. RDP allows users to connect remotely to systems so they can be operated from afar. The open source nature of the FreeRDP library means that it is integrated […]

Fortinet Launches Global Threat Intelligence Service  

Fortinet Launches Global Threat Intelligence Service Source:: Fortinet

Fortinet Launches Global Threat Intelligence Service  

Fortinet Launches Global Threat Intelligence Service Source:: Fortinet

Value Chain Security: Mid-Year 2017 Perspective

By Edna Conway Value Chain Security is increasingly top of mind across industry and government. The word is out – the value chain must be addressed to ensure viable security. Whether the discussion is framed as third party risk, cybersecurity or critical infrastructure, Cisco is at the forefront of addressing security holistically across the end-to-end […]

Value Chain Security: Mid-Year 2017 Perspective

By Edna Conway Value Chain Security is increasingly top of mind across industry and government. The word is out – the value chain must be addressed to ensure viable security. Whether the discussion is framed as third party risk, cybersecurity or critical infrastructure, Cisco is at the forefront of addressing security holistically across the end-to-end […]

Threat Round-up for July 14 – July 21

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between July 14 and July 21. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our […]