You already own the most powerful security tool. Are you really using it? Really?

By Dan Stotts See and stop threats using your existing network. If you live in the United States, there’s a 44% chance your most valuable personal data were recently compromised[1]. The silver lining, if there is one, is that this breach compelled many to start actively monitoring their credit report for signs of suspicious activity. It often takes […]

Source:: Cisco Security Notice

Introducing a New Addition to Cisco’s Security Impact Rating

By Zach Spicer The Cisco Product Security Incident Response Team (PSIRT) is committed to protecting customers by sharing security-related information in a timely manner and in different formats. Although some of the information that we receive may not relate to a specific vulnerability or issue in a Cisco product, the information may be valuable to our customers. For […]

Source:: Cisco Security Notice

Introducing a New Addition to Cisco’s Security Impact Rating

By Zach Spicer The Cisco Product Security Incident Response Team (PSIRT) is committed to protecting customers by sharing security-related information in a timely manner and in different formats. Although some of the information that we receive may not relate to a specific vulnerability or issue in a Cisco product, the information may be valuable to our customers. For […]

Source:: Cisco Security Notice

Vulnerability Walkthrough: – 7zip CVE-2016-2334 HFS+ Code Execution Vulnerability

By Talos Group This blog post was authored by Marcin Noga of Cisco Talos. Introduction In 2016 Talos released an advisory for CVE-2016-2334, which was a remote code execution vulnerability affecting certain versions of 7zip, a popular compression utility. In this blog post we will walk through the process of weaponizing this vulnerability and creating a fully working […]

Source:: Cisco Security Notice

Vulnerability Walkthrough: – 7zip CVE-2016-2334 HFS+ Code Execution Vulnerability

By Talos Group This blog post was authored by Marcin Noga of Cisco Talos. Introduction In 2016 Talos released an advisory for CVE-2016-2334, which was a remote code execution vulnerability affecting certain versions of 7zip, a popular compression utility. In this blog post we will walk through the process of weaponizing this vulnerability and creating a fully working […]

Source:: Cisco Security Notice

CMS Brute Force Attacks Are Still a Threat

By Anna Shirokova Brute force attacks have existed long before the Internet. As a cryptanalytic attack, it started being used as an attempt to access encrypted data when there were no other options available. With the rise of the Internet, this type of attack was quickly adopted. In a nutshell, a brute force attack consists of systematically trying different credentials until the correct combination […]

Source:: Cisco Security Notice

CMS Brute Force Attacks Are Still a Threat

By Anna Shirokova Brute force attacks have existed long before the Internet. As a cryptanalytic attack, it started being used as an attempt to access encrypted data when there were no other options available. With the rise of the Internet, this type of attack was quickly adopted. In a nutshell, a brute force attack consists of systematically trying different credentials until the correct combination […]

Source:: Cisco Security Notice

Improving Cybersecurity in Healthcare Part II: Control

By Kevin Skahill The Internet of Things (IoT) is ushering in an exciting digital renaissance that is redefining the traditional models of how healthcare is delivered. With IoT devices such as smart infusion pumps or connected inhalers, healthcare providers can now remotely monitor and adjust care. IoT devices in healthcare, where mobile and wearable devices are increasingly connected […]

Source:: Cisco Security Notice

Improving Cybersecurity in Healthcare Part II: Control

By Kevin Skahill The Internet of Things (IoT) is ushering in an exciting digital renaissance that is redefining the traditional models of how healthcare is delivered. With IoT devices such as smart infusion pumps or connected inhalers, healthcare providers can now remotely monitor and adjust care. IoT devices in healthcare, where mobile and wearable devices are increasingly connected […]

Source:: Cisco Security Notice

Dissecting a Breach: The Process of Incident Response

By Matt Aubert On December 5, 2017, at 1 pm Eastern, Cisco Security Incident Response Service experts will present a webinar titled “Dissecting a Breach: An Incident Responder’s Perspective.” This webinar will describe how our team performs incident handling within the service and what you should expect during any incident engagement, regardless of who is doing the work. We […]

Source:: Cisco Security Notice