Going with what works: The state of phishing
By Marc Blackmer Go phish! Cyber-attacks are big business. And the bad guys know that in any business, the more revenue you can generate with least investment means larger profits. It makes… Source:: Cisco Security Notice
Five Questions to Ask About Your Data Privacy in the EU
By Bruce Johnson The new EU data warehouse for Cisco Umbrella log storage promises to make your life a little less complicated and enhance your data privacy. Source:: Cisco Security Notice
Five Questions to Ask About Your Data Privacy in the EU
By Bruce Johnson The new EU data warehouse for Cisco Umbrella log storage promises to make your life a little less complicated and enhance your data privacy. Source:: Cisco Security Notice
Vulnerability Spotlight: Multiple Vulnerabilities in Yi Technology Home Camera
By Talos Group Vulnerabilities Discovered by Lilith [x_x] of Cisco Talos. Overview Cisco Talos is disclosing multiple vulnerabilities in the firmware of the Yi Technology Home Camera. In order to prevent the exploitation… Source:: Cisco Security Notice
Vulnerability Spotlight: Multiple Vulnerabilities in Yi Technology Home Camera
By Talos Group Vulnerabilities Discovered by Lilith [x_x] of Cisco Talos. Overview Cisco Talos is disclosing multiple vulnerabilities in the firmware of the Yi Technology Home Camera. In order to prevent the exploitation… Source:: Cisco Security Notice
Anatomy of a sextortion scam
By Talos Group Since this July, attackers are increasingly spreading sextortion-type attacks across the internet. Cisco Talos has been investigating these campaigns over the past few months. In many cases the spammers harvested email addresses… Source:: Cisco Security Notice
Anatomy of a sextortion scam
By Talos Group Since this July, attackers are increasingly spreading sextortion-type attacks across the internet. Cisco Talos has been investigating these campaigns over the past few months. In many cases the spammers harvested email addresses… Source:: Cisco Security Notice