Going with what works: The state of phishing

By Marc Blackmer Go phish! Cyber-attacks are big business. And the bad guys know that in any business, the more revenue you can generate with least investment means larger profits. It makes

Source:: Cisco Security Notice

Going with what works: The state of phishing

By Marc Blackmer Go phish! Cyber-attacks are big business. And the bad guys know that in any business, the more revenue you can generate with least investment means larger profits. It makes

Source:: Cisco Security Notice

Five Questions to Ask About Your Data Privacy in the EU

By Bruce Johnson The new EU data warehouse for Cisco Umbrella log storage promises to make your life a little less complicated and enhance your data privacy.

Source:: Cisco Security Notice

Five Questions to Ask About Your Data Privacy in the EU

By Bruce Johnson The new EU data warehouse for Cisco Umbrella log storage promises to make your life a little less complicated and enhance your data privacy.

Source:: Cisco Security Notice

Vulnerability Spotlight: Multiple Vulnerabilities in Yi Technology Home Camera

By Talos Group Vulnerabilities Discovered by Lilith [x_x] of Cisco Talos. Overview Cisco Talos is disclosing multiple vulnerabilities in the firmware of the Yi Technology Home Camera. In order to prevent the exploitation

Source:: Cisco Security Notice

Vulnerability Spotlight: Multiple Vulnerabilities in Yi Technology Home Camera

By Talos Group Vulnerabilities Discovered by Lilith [x_x] of Cisco Talos. Overview Cisco Talos is disclosing multiple vulnerabilities in the firmware of the Yi Technology Home Camera. In order to prevent the exploitation

Source:: Cisco Security Notice

Anatomy of a sextortion scam

By Talos Group Since this July, attackers are increasingly spreading sextortion-type attacks across the internet. Cisco Talos has been investigating these campaigns over the past few months. In many cases the spammers harvested email addresses

Source:: Cisco Security Notice

Anatomy of a sextortion scam

By Talos Group Since this July, attackers are increasingly spreading sextortion-type attacks across the internet. Cisco Talos has been investigating these campaigns over the past few months. In many cases the spammers harvested email addresses

Source:: Cisco Security Notice

Talos Vulnerability Discovery Year in Review – 2018

By Talos Group Introduction Cisco Talos‘ Vulnerability Discovery Team investigates software and operating system vulnerabilities in order to discover them before malicious threat actors. We provide this information to vendors so that they

Source:: Cisco Security Notice

Talos Vulnerability Discovery Year in Review – 2018

By Talos Group Introduction Cisco Talos‘ Vulnerability Discovery Team investigates software and operating system vulnerabilities in order to discover them before malicious threat actors. We provide this information to vendors so that they

Source:: Cisco Security Notice