Microsoft Patch Tuesday – February 2016
By Talos Group Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release contains twelve bulletins addressing 37 vulnerabilities. Five bulletins are rated critical and address vulnerabilities in Internet Explorer, Edge, Windows Journal, Office and Windows PDF. The remaining seven bulletins are rated important […]
Microsoft Patch Tuesday – February 2016
By Talos Group Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release contains twelve bulletins addressing 37 vulnerabilities. Five bulletins are rated critical and address vulnerabilities in Internet Explorer, Edge, Windows Journal, Office and Windows PDF. The remaining seven bulletins are rated important […]
Protect Your Entire Digital Self
By Anthony Grieco Cisco is proud to join the National Cybersecurity Alliance in its support of White House efforts to improve online security. Source:: Cisco Security Notice
Protect Your Entire Digital Self
By Anthony Grieco Cisco is proud to join the National Cybersecurity Alliance in its support of White House efforts to improve online security. Source:: Cisco Security Notice
Bedep Lurking in Angler’s Shadows
By Talos Group This post is authored by Nick Biasini . In October 2015, Talos released our detailed investigation of the Angler Exploit Kit which outlined the infrastructure and monetary impact of an exploit kit campaign delivering ransomware. During the investigation we found that two thirds of Angler’s payloads were some variation of ransomware and […]
Bedep Lurking in Angler’s Shadows
By Talos Group This post is authored by Nick Biasini . In October 2015, Talos released our detailed investigation of the Angler Exploit Kit which outlined the infrastructure and monetary impact of an exploit kit campaign delivering ransomware. During the investigation we found that two thirds of Angler’s payloads were some variation of ransomware and […]
Simplifying Security Architectures with SAFE
By Christian Janoff Safe. The very sound of it resonates with security. It is with some irony that Cisco has decided to reuse the term. Why ironic? For one, there is the idea among security folk that in reality, nothing is entirely safe. Why would Cisco sell intrusion detection if no intruders can, well…intrude? For […]