By Talos Group This blog was authored by Warren Mercer and Paul Rascagneres. Talos has investigated a targeted malware campaign against South Korean users. The campaign was active between November 2016 and January 2017, targeting a limited number of people. The infection vector is a Hangul Word Processor document (HWP), a popular alternative to Microsoft Office for South Korean users […]

Source:: Cisco Security Notice

By Joe Malenfant Over the last half decade the term sandboxing has become so pervasive, many customers I speak to have forgotten what it’s for! Sandboxing is a type of malware analysis – dynamic malware analysis to be exact. You execute a sample / file in a virtual environment and see what happens. There are numerous other types […]

Source:: Cisco Security Notice

By Joe Malenfant Over the last half decade the term sandboxing has become so pervasive, many customers I speak to have forgotten what it’s for! Sandboxing is a type of malware analysis – dynamic malware analysis to be exact. You execute a sample / file in a virtual environment and see what happens. There are numerous other types […]

Source:: Cisco Security Notice

Heute gibt es die erste Ausgabe unseres neuen Video-Formats. Hier erklären wir, um was es dabei gehen wird:

In der ersten Ausgabe geht es um den Factory Reset bei Innovaphone IP241, IP240, IP230 und IP240A. Es kommt ja eher selten vor, dass man ein Innovaphone Endgerät auf Werkseinstellungen zurücksetzen muss, aber eben weil das nicht oft vorkommt, findet man dann diese Funktion zum Zeitpunkt X nicht. Hier zeigen wir, wie es geht:

By David C. Stuart We live in a time when lines in IT are blurring, and the line between security and network operations is just one example. When organizations are breached, their network is imperiled and business can suffer. Resiliency, performance, and threat defense are increasingly intertwined. No one understands this better than Cisco, with our decades of network […]

Source:: Cisco Security Notice

By David C. Stuart We live in a time when lines in IT are blurring, and the line between security and network operations is just one example. When organizations are breached, their network is imperiled and business can suffer. Resiliency, performance, and threat defense are increasingly intertwined. No one understands this better than Cisco, with our decades of network […]

Source:: Cisco Security Notice

By Talos Group Vulnerabilities discovered by Talos Talos is releasing multiple vulnerabilities discovered in the Aerospike Database Server. These vulnerabilities range from Denial of Service to potential remote code execution. This software is used by various companies that require a high performance NoSQL database. These issues have been addressed in version 3.11.1.1 of the Aerospike Database software. The […]

Source:: Cisco Security Notice

By Talos Group Vulnerabilities discovered by Talos Talos is releasing multiple vulnerabilities discovered in the Aerospike Database Server. These vulnerabilities range from Denial of Service to potential remote code execution. This software is used by various companies that require a high performance NoSQL database. These issues have been addressed in version 3.11.1.1 of the Aerospike Database software. The […]

Source:: Cisco Security Notice

Neue Version des Netzwerk-Tools Wireshark

Das vermutlich weltweit meist genutzte Netzwerk-Analyse-Werkzeug steht in der neuen stable-Version 2.2.4 zum Download bereit. Geneigte User können auf der Wireshark-Seite die gewünschte Version für Windows oder Mac OS herunterladen.

Die Release-Notes zu den Versionen sind hier zu finden…und den User Guide gibt´s hier.

Wer nicht lesen mag, kann sich die Version 2 auch gerne im Video anschauen:

 

By Aaron Varrone At Cisco, we are often asked to take a vendor agnostic approach when developing a Security Operations Center (SOC) strategy, and as such, we must consider the importance of distinguishing between the various types of SOC models in today’s demanding security needs. However, before explaining the various models that exist for today’s need of monitoring […]

Source:: Cisco Security Notice