Einträge von Technik Support

It’s That Time Again—Announcing the Cisco IOS & XE Software Security Advisory Bundled Publication

By Erin Float Today, we released the last Cisco IOS & XE Software Security Advisory Bundled Publication of 2015. As a reminder, Cisco discloses IOS vulnerabilities on a predictable schedule (the fourth Wednesday of March and September each calendar year). Last cycle, we began including Cisco Security Advisories addressing vulnerabilities in Cisco IOS XE Software […]

It’s That Time Again—Announcing the Cisco IOS & XE Software Security Advisory Bundled Publication

By Erin Float Today, we released the last Cisco IOS & XE Software Security Advisory Bundled Publication of 2015. As a reminder, Cisco discloses IOS vulnerabilities on a predictable schedule (the fourth Wednesday of March and September each calendar year). Last cycle, we began including Cisco Security Advisories addressing vulnerabilities in Cisco IOS XE Software […]

SYNful Knock Scanner

By Talos Group This post was authored by William McVey . Talos is constantly researching the ways in which threat actors are evolving to exploit systems. Recently, a piece of persistent malware coined as “ SYNful Knock” was discovered on Cisco routers . While this malware attack is not a vulnerability, as it had to […]

SYNful Knock Scanner

By Talos Group This post was authored by William McVey . Talos is constantly researching the ways in which threat actors are evolving to exploit systems. Recently, a piece of persistent malware coined as “ SYNful Knock” was discovered on Cisco routers . While this malware attack is not a vulnerability, as it had to […]

Cognitive Research: Fake Blogs Generating Real Money

By Michal Sofka Summary In the past several months Cisco Cognitive Threat Analytics (CTA) researchers have observed a number of blog sites using either fake content or content stolen from other sites to drive traffic to click on ad-loaded web sites. We have observed traffic volume up to 10,000 requests per hour, targeting hundreds of […]

Cognitive Research: Fake Blogs Generating Real Money

By Michal Sofka Summary In the past several months Cisco Cognitive Threat Analytics (CTA) researchers have observed a number of blog sites using either fake content or content stolen from other sites to drive traffic to click on ad-loaded web sites. We have observed traffic volume up to 10,000 requests per hour, targeting hundreds of […]

Welcome Michelle Dennedy, Cisco’s Chief Privacy Officer

By John Stewart “It’s our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track.” —The Privacy Engineer’s Manifesto, 2014 Privacy in an always and increasingly connected world […]

Welcome Michelle Dennedy, Cisco’s Chief Privacy Officer

By John Stewart “It’s our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track.” —The Privacy Engineer’s Manifesto, 2014 Privacy in an always and increasingly connected world […]