Einträge von Technik Support

Vulnerability Spotlight: LibreOffice RTF Vulnerability

By Talos Group Vulnerability discovered by Aleksandar Nikolic of Cisco Talos. Talos is disclosing the presence of CVE-2016-4324 / TALOS-CAN-0126, a Use After Free vulnerability within the RTF parser of LibreOffice. The vulnerability lies in the parsing of documents containing both stylesheet and superscript tokens. A specially crafted RTF document containing both a stylesheet and […]

Vulnerability Spotlight: LibreOffice RTF Vulnerability

By Talos Group Vulnerability discovered by Aleksandar Nikolic of Cisco Talos. Talos is disclosing the presence of CVE-2016-4324 / TALOS-CAN-0126, a Use After Free vulnerability within the RTF parser of LibreOffice. The vulnerability lies in the parsing of documents containing both stylesheet and superscript tokens. A specially crafted RTF document containing both a stylesheet and […]

Better Security Through Openness and Multi-Vendor Integration

By Scott Pope Cisco Further Expands Technology Partner Ecosystem – New Partners and New Tech Integration Areas Security is an interconnected system, not a bunch of disparate boxes. Like a school of fish, security should operate collaboratively to accomplish a goal. Not just for the sake of “integration”, but because the very nature of securing […]

Better Security Through Openness and Multi-Vendor Integration

By Scott Pope Cisco Further Expands Technology Partner Ecosystem – New Partners and New Tech Integration Areas Security is an interconnected system, not a bunch of disparate boxes. Like a school of fish, security should operate collaboratively to accomplish a goal. Not just for the sake of “integration”, but because the very nature of securing […]

Connected Value Chains: The Pervasive Security Imperative

By Edna Conway We can no longer debate the reality of digital disruption and its impact on each of us in all we do, at work, at home and at play. Today’s challenge is to embrace the connected world and address security on a comprehensive continuum to ensure its optimum impact. To do this, we […]

Connected Value Chains: The Pervasive Security Imperative

By Edna Conway We can no longer debate the reality of digital disruption and its impact on each of us in all we do, at work, at home and at play. Today’s challenge is to embrace the connected world and address security on a comprehensive continuum to ensure its optimum impact. To do this, we […]

AMP for Networks is SAFETY Act Certified®

By Jason Lamar The Department of Homeland Security (DHS) issued a SAFETY Act Certification to Cisco for our Advanced Malware Protection for Networks technology. This certification follows an extensive DHS review and extends potential liability protections to Cisco’s customers that use AMP for Networks. Congrats to Cisco Systems, Inc., on their recent SAFETY Act Certification! […]

AMP for Networks is SAFETY Act Certified®

By Jason Lamar The Department of Homeland Security (DHS) issued a SAFETY Act Certification to Cisco for our Advanced Malware Protection for Networks technology. This certification follows an extensive DHS review and extends potential liability protections to Cisco’s customers that use AMP for Networks. Congrats to Cisco Systems, Inc., on their recent SAFETY Act Certification! […]

Vulnerability Spotlight: Pidgin Vulnerabilities

By Talos Group These vulnerabilities were discovered by Yves Younan. Pidgin is a universal chat client that is used on millions of systems worldwide. The Pidgin chat client enables you to communicate on multiple chat networks simultaneously. Talos has identified multiple vulnerabilities in the way Pidgin handles the MXit protocol. These vulnerabilities fall into the […]

Vulnerability Spotlight: Pidgin Vulnerabilities

By Talos Group These vulnerabilities were discovered by Yves Younan. Pidgin is a universal chat client that is used on millions of systems worldwide. The Pidgin chat client enables you to communicate on multiple chat networks simultaneously. Talos has identified multiple vulnerabilities in the way Pidgin handles the MXit protocol. These vulnerabilities fall into the […]