IT-Sicherheit vom Endpoint bis zur Cloud

Mit unserem Partner Fortinet bieten wir eine einzigartige und breit angelegte Security-Lösung an: Die Fortinet Security-Fabric, ein Netz aus miteinander kommunizierenden, spezialisierten Lösungen für die unterschiedlichen Bereiche im Unternehmen. Vom Arbeitsplatzrechner, über LAN und WLAN, Mail, Web-Applikationen u.v.m., bis zum weltweiten FortiGuard Service, bei dem hunderte Spezialisten Millionen von Sensordaten auswerten und Schadsoftware entdecken und […]

New Forensic Investigation Procedures for First Responder Guides

By Todd Reid Cisco is pleased to announce a new series of Forensic Investigation Procedures for First Responders guides that will help customers and partners triage Cisco products that are suspected of being tampered with or compromised. These guides provide step-by-step instructions for collecting information that first responders can use for forensic analysis for several […]

Threat Roundup for August 23 to August 30

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Aug. 23 and Aug. 30. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how […]

Cisco Advanced Malware Protection for Endpoints Awarded AV-Comparatives’ Approved Business Product Award

By Marc Blackmer We are very pleased to share the news that our Advanced Malware Protection (AMP) for Endpoints won the Approved Business Security Award from AV-Comparatives. And we’re happy about this for a couple of reasons. (Click this link to read the full report.) Most vendors‘ marketing materials look great, your organization exists in […]

Boosting Trust with Industry-Leading APEC PRP Certification

By Harvey Jang Cisco is now certified under the new Asia-Pacific Economic Cooperation (APEC) Privacy Recognition for Processors (PRP) System. Cisco has been an active supporter of the APEC Cross Border Privacy Rules system (CBPRs) and an advocate for safe and secure global data flows. We are an early adopter and the eighth company to […]

Insights Regarding the Cisco REST API Container for IOS XE Software Authentication Bypass Vulnerability

By Cisco PSIRT This blog post was authored by Eugenio Iavarone, Cisco PSIRT. On August 28th, 2019, Cisco published a Security Advisory titled “Cisco REST API Container for Cisco IOS XE Software Authentication Bypass Vulnerability”, disclosing an internally found vulnerability which affects the Cisco REST API container for Cisco IOS XE. An exploit could be […]

RAT Ratatouille – Backdooring PCs with leaked RATs

By Talos Group Orcus RAT and RevengeRAT are two of the most popular remote access trojans (RATs) in use across the threat landscape. Since its emergence in 2016, various adversaries used RevengeRAT to attack organizations and individuals around the world. The source code associated with RevengeRAT was previously released to the public, allowing attackers to […]