Poisoning the Well: Banking Trojan Targets Google Search Results

By Talos Group This blog post was authored by Edmund Brumaghin, Earl Carter and Emmanuel Tacheau. Summary It has become common for users to use Google to find information that they do not know. In a quick Google search you can find practically anything you need to know. Links returned by a Google search, however, are not guaranteed to be safe. In […]

Source:: Cisco Security Notice

Extend Your Security to the Cloud with Confidence

By Player Pate Introducing the Cisco Cloud Security Assessment Service On a recent trip with my kids, one of them remarked how differently the clouds looked from the plane and how passing through them you couldn’t see theoutline that seems so clear when viewing clouds from the ground. I explained to her that when you’re looking at a […]

Source:: Cisco Security Notice

Extend Your Security to the Cloud with Confidence

By Player Pate Introducing the Cisco Cloud Security Assessment Service On a recent trip with my kids, one of them remarked how differently the clouds looked from the plane and how passing through them you couldn’t see theoutline that seems so clear when viewing clouds from the ground. I explained to her that when you’re looking at a […]

Source:: Cisco Security Notice

Cisco Expands Its Multicloud Security Portfolio

By David Ulevitch The traditional corporate data center is still the hub for most enterprises, but increasingly organizations are leveraging the benefits of the multicloud world to drive operational efficiencies, scale and expand growth. While the benefits are clear, securing multicloud environments like SaaS apps, public cloud infrastructure and hybrid cloud environments is complex. Users are increasingly self-selecting […]

Source:: Cisco Security Notice

Cisco Expands Its Multicloud Security Portfolio

By David Ulevitch The traditional corporate data center is still the hub for most enterprises, but increasingly organizations are leveraging the benefits of the multicloud world to drive operational efficiencies, scale and expand growth. While the benefits are clear, securing multicloud environments like SaaS apps, public cloud infrastructure and hybrid cloud environments is complex. Users are increasingly self-selecting […]

Source:: Cisco Security Notice

Security as a Strategic Imperative

By Anthony Grieco In the digital era, every company is considered a technology company. Whether you provide electricity, banking or public transportation, you are increasingly dependent upon the internet and network connectively. If all companies are technology companies, that means all companies need to prioritize cybersecurity as a strategic imperative to ensure they are connected, digitized and successful. […]

Source:: Cisco Security Notice

Security as a Strategic Imperative

By Anthony Grieco In the digital era, every company is considered a technology company. Whether you provide electricity, banking or public transportation, you are increasingly dependent upon the internet and network connectively. If all companies are technology companies, that means all companies need to prioritize cybersecurity as a strategic imperative to ensure they are connected, digitized and successful. […]

Source:: Cisco Security Notice

Vulnerability Spotlight: The Circle of a Bug’s Life

By Talos Group Cisco Talos is disclosing several vulnerabilities identified in Circle with Disney. Circle with Disney is a network device designed to monitor the Internet use of children on a given network. Circle pairs wirelessly, with your home Wi-Fi and allows you to manage every device on the network, tablet, TV, or laptop. It can also pair […]

Source:: Cisco Security Notice

Vulnerability Spotlight: The Circle of a Bug’s Life

By Talos Group Cisco Talos is disclosing several vulnerabilities identified in Circle with Disney. Circle with Disney is a network device designed to monitor the Internet use of children on a given network. Circle pairs wirelessly, with your home Wi-Fi and allows you to manage every device on the network, tablet, TV, or laptop. It can also pair […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Multiple Vulnerabilities in Cesanta Mongoose Server

By Talos Group These vulnerabilities were discovered by Aleksandar Nikolic of Cisco Talos Today, Talos is disclosing several vulnerabilities that have been identified in Cesanta Mongoose server. Cesanta Mongoose is a library implementing a number of networking protocols, including HTTP, MQTT, MDNS and others. It is designed with embedded devices in mind and as such is used in […]

Source:: Cisco Security Notice