Your Email Security Toolbox: Defense in Depth

By Munawar Hossain Criminals know that easily-obtained data can help them craft a compelling attack campaign. Here are some essential tools defenders must have to thwart these sophisticated attacks. Source:: Cisco Security Notice

Vulnerability Spotlight: Multiple vulnerabilities in Atlantis Word Processor

By Talos Group Vulnerabilities discovered by Cory Duplantis and Ali Rizvi-Santiago of Cisco Talos. Overview Cisco Talos is disclosing several vulnerabilities discovered in Atlantis Word Processor. Atlantis Word Processor… Source:: Cisco Security Notice

Vulnerability Spotlight: Multiple vulnerabilities in Atlantis Word Processor

By Talos Group Vulnerabilities discovered by Cory Duplantis and Ali Rizvi-Santiago of Cisco Talos. Overview Cisco Talos is disclosing several vulnerabilities discovered in Atlantis Word Processor. Atlantis Word Processor… Source:: Cisco Security Notice

Support:Wireless Handset Firmware and Management Software product/9.00/wireless 100032 (hotfix15) available

Source:: Innovaphone

Support:Wireless Handset Firmware and Management Software product/9.00/wireless 100032 (hotfix15) available

Source:: Innovaphone

Defeating Polymorphic Malware with Cognitive Intelligence. Part 2: Command Line Argument Clustering

By Evgeny Mirolyubov Command Line Argument Clustering algorithm is an innovative weapon that works for security analysts to help uncover evasive malware and morphing threats in their environments. Source:: Cisco Security Notice

Defeating Polymorphic Malware with Cognitive Intelligence. Part 2: Command Line Argument Clustering

By Evgeny Mirolyubov Command Line Argument Clustering algorithm is an innovative weapon that works for security analysts to help uncover evasive malware and morphing threats in their environments. Source:: Cisco Security Notice