The Ecosystem of Women in Cybersecurity – A Key to our Future!

By Edna Conway Digitization is driving each of us across all industries to make dramatic changes to how we approach customers, products, services, and the always-on, real-time information rich marketplace. This digital economy is gender agnostic. And, it is highly dependent on a connected global ecosystem. The message is clear—no one person, enterprise, industry, government or region can […]

Source:: Cisco Security Notice

Talos Wins The 5th Volatility Plugin Contest With Pyrebox

By Talos Group Talos has won this year’s 5th Volatility plugin contest with Pyrebox. Volatility is a well-known open-source framework designed to analyse operating system memory. The framework exists since 2007, for the previous 5 years they have run a plugin contest to find the most innovative, interesting, and useful extensions for the Volatility framework. Pyrebox is an open-source Python scriptable […]

Source:: Cisco Security Notice

Talos Wins The 5th Volatility Plugin Contest With Pyrebox

By Talos Group Talos has won this year’s 5th Volatility plugin contest with Pyrebox. Volatility is a well-known open-source framework designed to analyse operating system memory. The framework exists since 2007, for the previous 5 years they have run a plugin contest to find the most innovative, interesting, and useful extensions for the Volatility framework. Pyrebox is an open-source Python scriptable […]

Source:: Cisco Security Notice

This Holiday Season – Buy One IoT Device, Get Free CVEs

By Talos Group As the Internet of Things gains steam and continues to develop, so are adversaries and the threats affecting these systems. Companies throughout the world are busy deploying low cost Internet-connected computing devices (aka the Internet of Things) to solve business problems and improve our lives. In tandem, criminals are developing their methods for abusing and […]

Source:: Cisco Security Notice

This Holiday Season – Buy One IoT Device, Get Free CVEs

By Talos Group As the Internet of Things gains steam and continues to develop, so are adversaries and the threats affecting these systems. Companies throughout the world are busy deploying low cost Internet-connected computing devices (aka the Internet of Things) to solve business problems and improve our lives. In tandem, criminals are developing their methods for abusing and […]

Source:: Cisco Security Notice

Threat Round Up for Nov 10 – Nov 17

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between November 10 and November 17. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

Source:: Cisco Security Notice

Threat Round Up for Nov 10 – Nov 17

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between November 10 and November 17. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

Source:: Cisco Security Notice

TrustSec: The Cybersecurity Enforcer

By Ed Cho So many newsworthy hacks in recent years have had a staggering impact on literally millions of consumers and businesses. While these hacks have perhaps made us numb to their effects, the reality is these breaches represent the new normal in today’s digitized world. And given that attackers are growing in number, sophistication and intensity, many […]

Source:: Cisco Security Notice

TrustSec: The Cybersecurity Enforcer

By Ed Cho So many newsworthy hacks in recent years have had a staggering impact on literally millions of consumers and businesses. While these hacks have perhaps made us numb to their effects, the reality is these breaches represent the new normal in today’s digitized world. And given that attackers are growing in number, sophistication and intensity, many […]

Source:: Cisco Security Notice

Cisco Email Security is Top Solution

By Claudia Martinez Billions of corporate messages flow back and forth on a daily basis. And with over 90% of breaches starting with an email, organizations today face a daunting challenge when choosing the best email security solution to stop emails with phishing links or malicious attachments that unleash ransomware, phishing or business email compromise attacks. Securing the […]

Source:: Cisco Security Notice