Was ist eigentlich DDoS?

Was ist eigentlich DDoS? Der Begriff DDoS taucht regelmäßig in den Medien auf, wenn es um Probleme im Internet geht. Doch was verbirgt sich eigentlich dahinter? DDoS ist die englische Abkürzung für Distributed Denial of Service. Dahinter verbirgt sich, dass ein Angreifer mittels einer Attacke versucht, einen Dienst, eine Anwendung, oder gar ein ganzes Netzwerk […]

Vulnerability Spotlight: Code Execution Vulnerability in LabVIEW

By Talos Group Overview LabVIEW is a system design and development platform released by National Instruments. The software is widely used to create applications for data acquisition, instrument control and industrial automation. Talos is disclosing the presence of a code execution vulnerability and a memory corruption vulnerability which can be triggered by opening specially crafted […]

Vulnerability Spotlight: Code Execution Vulnerability in LabVIEW

By Talos Group Overview LabVIEW is a system design and development platform released by National Instruments. The software is widely used to create applications for data acquisition, instrument control and industrial automation. Talos is disclosing the presence of a code execution vulnerability and a memory corruption vulnerability which can be triggered by opening specially crafted […]

March 2017 Cisco IOS & IOS XE Software Bundled Publication

By Erin Float Today, we released the first Cisco IOS & IOS XE Software Security Advisory Bundled Publication of 2017. (As a reminder, Cisco discloses vulnerabilities in Cisco IOS and IOS XE Software on a predictable schedule—the fourth Wednesday of March and September in each calendar year). Today’s edition of the Cisco IOS & IOS […]

March 2017 Cisco IOS & IOS XE Software Bundled Publication

By Erin Float Today, we released the first Cisco IOS & IOS XE Software Security Advisory Bundled Publication of 2017. (As a reminder, Cisco discloses vulnerabilities in Cisco IOS and IOS XE Software on a predictable schedule—the fourth Wednesday of March and September in each calendar year). Today’s edition of the Cisco IOS & IOS […]

“Time to Evolve” Analysis Yields New Insight on Malware Obfuscation Techniques and Adds Dimension to “Time to Detection” Metric

By Aaron Weis [Blog authored by Aaron Weis and Samuel Wigley] Cisco has been measuring our security products‘ median “time to detection” (TTD) — the window of time between a compromise and detection of a threat — since 2015. This exercise is a way for us to benchmark our progress, and continually refine our approach, […]

“Time to Evolve” Analysis Yields New Insight on Malware Obfuscation Techniques and Adds Dimension to “Time to Detection” Metric

By Aaron Weis [Blog authored by Aaron Weis and Samuel Wigley] Cisco has been measuring our security products‘ median “time to detection” (TTD) — the window of time between a compromise and detection of a threat — since 2015. This exercise is a way for us to benchmark our progress, and continually refine our approach, […]