Einträge von Technik Support

Cisco Takes Exclusivity Out of Cybersecurity

By Michele Guel Nearly 30 years ago, I attended the first of what would be hundreds of information security conferences throughout my career. I was astonished to be one of only a handful of females in a sea of men – our career goals were the same, but I had a steep climb compared to […]

Cisco Takes Exclusivity Out of Cybersecurity

By Michele Guel Nearly 30 years ago, I attended the first of what would be hundreds of information security conferences throughout my career. I was astonished to be one of only a handful of females in a sea of men – our career goals were the same, but I had a steep climb compared to […]

“Cyber Conflict” Decoy Document Used In Real Cyber Conflict

By Talos Group This post was authored by Warren Mercer, Paul Rascagneres and Vitor Ventura INTRODUCTION Cisco Talos discovered a new malicious campaign from the well known actor Group 74 (aka Tsar Team, Sofacy, APT28, Fancy Bear…). Ironically the decoy document is a flyer concerning the Cyber Conflict U.S. conference organized by the NATO Cooperative […]

“Cyber Conflict” Decoy Document Used In Real Cyber Conflict

By Talos Group This post was authored by Warren Mercer, Paul Rascagneres and Vitor Ventura INTRODUCTION Cisco Talos discovered a new malicious campaign from the well known actor Group 74 (aka Tsar Team, Sofacy, APT28, Fancy Bear…). Ironically the decoy document is a flyer concerning the Cyber Conflict U.S. conference organized by the NATO Cooperative […]

Architecting a More Secure Future

By Ron Zalkind The new age of innovation is providing a level of convenience and technological advancements that were once unfathomable. But with every breakthrough comes challenges, and more precisely these days, security challenges. We, in the security industry, are constantly faced with new threats emerging from vectors that didn’t even exist yesterday. Enterprise Security […]

Architecting a More Secure Future

By Ron Zalkind The new age of innovation is providing a level of convenience and technological advancements that were once unfathomable. But with every breakthrough comes challenges, and more precisely these days, security challenges. We, in the security industry, are constantly faced with new threats emerging from vectors that didn’t even exist yesterday. Enterprise Security […]

Vulnerability Spotlight: Google PDFium Tiff Code Execution

By Talos Group Overview Talos is disclosing a single off-by-one read/write vulnerability found in the TIFF image decoder functionality of PDFium as used in Google Chrome up to and including version 60.0.3112.101. Google Chrome is the most widely used web browser today and a specially crafted PDF could trigger the vulnerability resulting in memory corruption, […]

Vulnerability Spotlight: Google PDFium Tiff Code Execution

By Talos Group Overview Talos is disclosing a single off-by-one read/write vulnerability found in the TIFF image decoder functionality of PDFium as used in Google Chrome up to and including version 60.0.3112.101. Google Chrome is the most widely used web browser today and a specially crafted PDF could trigger the vulnerability resulting in memory corruption, […]