Vulnerability Spotlight: Multiple Vulnerabilities in Foscam C1 Indoor HD Cameras

By Talos Group These vulnerabilities were discovered by Claudio Bozzato of Cisco Talos. Executive Summary The Foscam C1 Indoor HD Camera is a network-based camera that is marketed for use in a variety of applications, including use as a home security monitoring device. Talos recently identified several vulnerabilities present in these devices, and worked with Foscam to develop […]

Source:: Cisco Security Notice

Immunize your endpoints with AMP and Umbrella

By Thomas Licisyn You wake up this morning, and you feel miserable and tired. Getting out of bed is the worst, but you stumble down the hall with a heavy head, chills, and a serious case of congestion just to get a glass of water. All signs point to the flu. What a way to start the day! […]

Source:: Cisco Security Notice

Immunize your endpoints with AMP and Umbrella

By Thomas Licisyn You wake up this morning, and you feel miserable and tired. Getting out of bed is the worst, but you stumble down the hall with a heavy head, chills, and a serious case of congestion just to get a glass of water. All signs point to the flu. What a way to start the day! […]

Source:: Cisco Security Notice

The Power of Role Models and a Good Book

By Lisa Bobbitt My path to cybersecurity looks more like a winding road than a straight line, but it’s the influential role models and valuable information I consumed with every turn that paved my path towards a career in cybersecurity – specifically privacy. I fell into secure networking by chance. I was attending North Carolina State University and […]

Source:: Cisco Security Notice

The Power of Role Models and a Good Book

By Lisa Bobbitt My path to cybersecurity looks more like a winding road than a straight line, but it’s the influential role models and valuable information I consumed with every turn that paved my path towards a career in cybersecurity – specifically privacy. I fell into secure networking by chance. I was attending North Carolina State University and […]

Source:: Cisco Security Notice

For threat correlation across endpoint, network, and cloud – connect the dots

By Beth Barach When I was a kid, I used to love dot-to-dot books. I enjoyed formulating a guess of what the picture was, the hunt in finding all the dots, the satisfaction of connecting them all together, and the excitement of the final picture coming into view to either confirm, or deny, my suspicions of what I […]

Source:: Cisco Security Notice

For threat correlation across endpoint, network, and cloud – connect the dots

By Beth Barach When I was a kid, I used to love dot-to-dot books. I enjoyed formulating a guess of what the picture was, the hunt in finding all the dots, the satisfaction of connecting them all together, and the excitement of the final picture coming into view to either confirm, or deny, my suspicions of what I […]

Source:: Cisco Security Notice

Stealthwatch Cloud: Securing the public cloud, without undercutting it

By Bryan Doerr Public cloud infrastructure requires a new approach to security. We’ve all heard that line, but what does it actually mean? There is little stopping you from, say, deploying agents in the cloud to monitor traffic and detect threats and bringing other on-premises techniques to bear. But as anyone who’s ever attempted this before will tell […]

Source:: Cisco Security Notice

Stealthwatch Cloud: Securing the public cloud, without undercutting it

By Bryan Doerr Public cloud infrastructure requires a new approach to security. We’ve all heard that line, but what does it actually mean? There is little stopping you from, say, deploying agents in the cloud to monitor traffic and detect threats and bringing other on-premises techniques to bear. But as anyone who’s ever attempted this before will tell […]

Source:: Cisco Security Notice

Poisoning the Well: Banking Trojan Targets Google Search Results

By Talos Group This blog post was authored by Edmund Brumaghin, Earl Carter and Emmanuel Tacheau. Summary It has become common for users to use Google to find information that they do not know. In a quick Google search you can find practically anything you need to know. Links returned by a Google search, however, are not guaranteed to be safe. In […]

Source:: Cisco Security Notice