By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between June 30 and July 07. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

Source:: Cisco Security Notice

By Talos Group Vulnerability discovered by Marcin Noga, Lilith Wyatt and Aleksandar Nikolic of Cisco Talos. Overview Talos has discovered multiple vulnerabilities in the freedesktop.org Poppler PDF library. Exploiting these vulnerabilities can allow an attacker to gain full control over the victim’s machine. If an attacker builds a specially crafted PDF document and the victim opens it, the […]

Source:: Cisco Security Notice

By Talos Group Vulnerability discovered by Marcin Noga, Lilith Wyatt and Aleksandar Nikolic of Cisco Talos. Overview Talos has discovered multiple vulnerabilities in the freedesktop.org Poppler PDF library. Exploiting these vulnerabilities can allow an attacker to gain full control over the victim’s machine. If an attacker builds a specially crafted PDF document and the victim opens it, the […]

Source:: Cisco Security Notice

By David McGrew Security owns a complex relationship with privacy, one that can work to protect privacy or undermine it. It is often a compromise, one for the other. Enterprises and other organizations regularly balance this relationship when protecting information systems. I am excited about Cisco’s launch of Encrypted Traffic Analytics (ETA), which offers a better balance point […]

Source:: Cisco Security Notice

By David McGrew Security owns a complex relationship with privacy, one that can work to protect privacy or undermine it. It is often a compromise, one for the other. Enterprises and other organizations regularly balance this relationship when protecting information systems. I am excited about Cisco’s launch of Encrypted Traffic Analytics (ETA), which offers a better balance point […]

Source:: Cisco Security Notice

Fortinet to Announce Second Quarter 2017 Financial Results

Source:: Fortinet

Fortinet to Announce Second Quarter 2017 Financial Results

Source:: Fortinet

By Talos Group This blog was authored by Paul Rascagneres Executive Summary We recently wrote about the KONNI Remote Access Trojan (RAT) which has been distributed by a small number of campaigns over the past 3 years. We have identified a new distribution campaign which took place on 4th July. The malware used in this campaign has similar […]

Source:: Cisco Security Notice

By Talos Group This blog was authored by Paul Rascagneres Executive Summary We recently wrote about the KONNI Remote Access Trojan (RAT) which has been distributed by a small number of campaigns over the past 3 years. We have identified a new distribution campaign which took place on 4th July. The malware used in this campaign has similar […]

Source:: Cisco Security Notice

Ivan Pepelnjak´s Vortrag auf der Troopers 17 Security Konferenz

In diesem Video erklärt Ivan Pepelnjak (in englischer Sprache) das Vorgehen, wenn man Netzwerkprozesse automatisieren will. Dass daran kein Weg vorbei führt, sollte mittlerweile angesichts der Fülle an Aufgaben jedem Administrator klar sein.

Dabei ist es egal, ob man eine kommerzielle Lösung kauft, oder gleich selbst eine Lösung entwickelt, denn auch scheinbar fertige Software muss in jedem Falle an die eigenen Gegebenheiten mittels Programmierung adaptiert werden. Also warum nicht gleich eine schlanke Entwicklung selbst vornehmen?

Dabei sind natürlich alle Bedingungen der Softwareentwicklung zu beachten, insbesondere intensives Testen und Kontrollieren der angesprochenen Komponenten.

Anschaulich und unterhaltsam erläutert Pepelnjak in diesem Video die erforderlichen Bedingungen: