Vulnerability Spotlight: Multiple Antenna House Vulnerabilities

By Talos Group Discovered by Marcin Noga of Cisco Talos Overview Cisco Talos has identified six vulnerabilities in the Antenna House Office Server Document Converter (OSDC). These vulnerabilities can be used to

Source:: Cisco Security Notice

Vulnerability Spotlight: Multiple Adobe Acrobat DC Remote Code Execution Vulnerabilties

By Talos Group Discovered by Aleksandar Nikolic of Cisco Talos Overview Today, Talos is releasing details of a new vulnerabilities within Adobe Acrobat Reader DC. Adobe Acrobat Reader is the most popular

Source:: Cisco Security Notice

Vulnerability Spotlight: Multiple Adobe Acrobat DC Remote Code Execution Vulnerabilties

By Talos Group Discovered by Aleksandar Nikolic of Cisco Talos Overview Today, Talos is releasing details of a new vulnerabilities within Adobe Acrobat Reader DC. Adobe Acrobat Reader is the most popular

Source:: Cisco Security Notice

Transparency and the CLOUD Act: The Importance of Evolving Transparency Reports

By Anthony Grieco Not only have we added new categories to our Transparency Report– such as the CLOUD Act – but we’ve also made enhancements to make it easier for our customers to read and interpret these requests.

Source:: Cisco Security Notice

Transparency and the CLOUD Act: The Importance of Evolving Transparency Reports

By Anthony Grieco Not only have we added new categories to our Transparency Report– such as the CLOUD Act – but we’ve also made enhancements to make it easier for our customers to read and interpret these requests.

Source:: Cisco Security Notice

Putting the “Active” Back in Proactive Security: Tabletop Exercises

By Paul Lee As security practitioners, we have the seemingly impossible task of defending an ever-changing environment. It seems like every time we get close to compliance, new vulnerabilities and threat vectors are

Source:: Cisco Security Notice

Putting the “Active” Back in Proactive Security: Tabletop Exercises

By Paul Lee As security practitioners, we have the seemingly impossible task of defending an ever-changing environment. It seems like every time we get close to compliance, new vulnerabilities and threat vectors are

Source:: Cisco Security Notice