By Talos Group This blog was authored by Warren Mercer and Paul Rascagneres. Talos has observed a small email campaign leveraging the use of Microsoft Publisher files. These .pub files are normally used for the publishing of documents such as newsletters, allowing users to create such documents using familiar office functions such as mail merging. Unlike other applications […]

Source:: Cisco Security Notice

By Talos Group This blog was authored by Warren Mercer and Paul Rascagneres. Talos has observed a small email campaign leveraging the use of Microsoft Publisher files. These .pub files are normally used for the publishing of documents such as newsletters, allowing users to create such documents using familiar office functions such as mail merging. Unlike other applications […]

Source:: Cisco Security Notice

By David Ulevitch Responding to security threats requires time, talent and money — resources that most security professionals would agree are in seemingly short supply. As discussed in the Cisco 2017 Annual Cybersecurity Report (ACR), security teams seek out strategies such as automated security solutions or cloud-based tools to overcome these resource constraints. Effective security requires automation and […]

Source:: Cisco Security Notice

By David Ulevitch Responding to security threats requires time, talent and money — resources that most security professionals would agree are in seemingly short supply. As discussed in the Cisco 2017 Annual Cybersecurity Report (ACR), security teams seek out strategies such as automated security solutions or cloud-based tools to overcome these resource constraints. Effective security requires automation and […]

Source:: Cisco Security Notice

Fortinet Reports Fourth Quarter and Full Year 2016 Financial Results

Source:: Fortinet

Fortinet Reports Fourth Quarter and Full Year 2016 Financial Results

Source:: Fortinet

Fortinet Introduces the World’s First Terabit Firewall Appliance and Market Leading 100 Gbps NGFW Chassis

Source:: Fortinet

Fortinet Introduces the World’s First Terabit Firewall Appliance and Market Leading 100 Gbps NGFW Chassis

Source:: Fortinet

By Matt Aubert Malware is one of the most prevalent and most insidious forms of cyber attack. Identifying and eliminating them are critical in minimizing the impact of a breach. As a cybersecurity incident responder, I always end up performing some level of malicious file analysis. In this blog, I’ll share some recommended approaches that have worked for […]

Source:: Cisco Security Notice

By Matt Aubert Malware is one of the most prevalent and most insidious forms of cyber attack. Identifying and eliminating them are critical in minimizing the impact of a breach. As a cybersecurity incident responder, I always end up performing some level of malicious file analysis. In this blog, I’ll share some recommended approaches that have worked for […]

Source:: Cisco Security Notice