Einträge von Technik Support

Vulnerability Spotlight: Libgraphite Font Processing Vulnerabilities

By Talos Group Vulnerabilities Discovered by Yves Younan of Cisco Talos. Talos is releasing an advisory for four vulnerabilities that have been found within the Libgraphite library, which is used for font processing in Linux, Firefox, OpenOffice, and other major applications. The most severe vulnerability results from an out-of-bounds read which the attacker can use […]

Vulnerability Spotlight: Libgraphite Font Processing Vulnerabilities

By Talos Group Vulnerabilities Discovered by Yves Younan of Cisco Talos. Talos is releasing an advisory for four vulnerabilities that have been found within the Libgraphite library, which is used for font processing in Linux, Firefox, OpenOffice, and other major applications. The most severe vulnerability results from an out-of-bounds read which the attacker can use […]

Cisco Hosting Amsterdam 2016 FIRST Technical Colloquium

By Matt Valites We’d like to announce a “Save the Date” and “Call for Speakers” for the FIRST Amsterdam Technical Colloquium (TC) 2016 . The event, hosted by Cisco Systems in Amsterdam, Netherlands will be a plenary style conference held on the 19th and 20th of April 2016. Event registration is open now. This will […]

Cisco Hosting Amsterdam 2016 FIRST Technical Colloquium

By Matt Valites We’d like to announce a “Save the Date” and “Call for Speakers” for the FIRST Amsterdam Technical Colloquium (TC) 2016 . The event, hosted by Cisco Systems in Amsterdam, Netherlands will be a plenary style conference held on the 19th and 20th of April 2016. Event registration is open now. This will […]

Find Advanced Threats with Cisco Cognitive Threat Analytics

By Joe Malenfant Attackers are constantly innovating, employing more sophisticated techniques to compromise organizations and gain access to other parts of the network and sensitive data including proprietary information, trade secrets, and of course financial information. Threats have evolved to the point that it’s no longer feasible to simply defend the perimeter. In the 2016 […]

Find Advanced Threats with Cisco Cognitive Threat Analytics

By Joe Malenfant Attackers are constantly innovating, employing more sophisticated techniques to compromise organizations and gain access to other parts of the network and sensitive data including proprietary information, trade secrets, and of course financial information. Threats have evolved to the point that it’s no longer feasible to simply defend the perimeter. In the 2016 […]

Cisco AMP for Endpoints Adds New Features

By John Dominguez The threat landscape is ever-changing. Attackers continue to innovate and refine their tactics, and malware is more sophisticated than ever. New threats are surfacing every day, like the Angler exploit kit and the SSHPsychos DDoS attack. According to the 2016 Cisco Annual Security Report , ransomware is exploding, Adobe Flash vulnerabilities continue […]

Cisco AMP for Endpoints Adds New Features

By John Dominguez The threat landscape is ever-changing. Attackers continue to innovate and refine their tactics, and malware is more sophisticated than ever. New threats are surfacing every day, like the Angler exploit kit and the SSHPsychos DDoS attack. According to the 2016 Cisco Annual Security Report , ransomware is exploding, Adobe Flash vulnerabilities continue […]