Vulnerability Spotlight: Adobe Acrobat Reader DC Collab reviewServer Remote Code Execution Vulnerability

By Talos Group Discovered by Aleksandar Nikolic of Cisco Talos Overview Today, Talos is releasing details of a new vulnerability within Adobe Acrobat Reader DC. Adobe Acrobat Reader is the most popular and… Source:: Cisco Security Notice

Vulnerability Spotlight: Adobe Acrobat Reader DC Collab reviewServer Remote Code Execution Vulnerability

By Talos Group Discovered by Aleksandar Nikolic of Cisco Talos Overview Today, Talos is releasing details of a new vulnerability within Adobe Acrobat Reader DC. Adobe Acrobat Reader is the most popular and… Source:: Cisco Security Notice

Jabra Pro 9400 wird eingestellt

Zum 3. Oktober 2018 wird Jabra die Produktion der Jabra Pro 9400-Serie einstellen. Die Produkte sind ab diesem Datum nur noch eingeschränkt lieferbar. Nachfolger ist die neue Jabra Engagement-Serie. Die neuen Jabra Headsets Engage 65 und 75 sind in die Innovaphone-Firmware bereits integriert und werden nun ab V12r2sr14 unterstützt. Damit können unsere Innovaphone-Kunden problemlos die […]

Vulnerability Spotlight: Multiple Issues in Foxit PDF Reader

By Talos Group Overview Cisco Talos is disclosing eightteen vulnerabilities in Foxit PDF Reader, a popular free program for viewing, creating and editing PDF documents. It is commonly used as an… Source:: Cisco Security Notice

Vulnerability Spotlight: Multiple Issues in Foxit PDF Reader

By Talos Group Overview Cisco Talos is disclosing eightteen vulnerabilities in Foxit PDF Reader, a popular free program for viewing, creating and editing PDF documents. It is commonly used as an… Source:: Cisco Security Notice

Your Email Security Toolbox: Defense in Depth

By Munawar Hossain Criminals know that easily-obtained data can help them craft a compelling attack campaign. Here are some essential tools defenders must have to thwart these sophisticated attacks. Source:: Cisco Security Notice

Your Email Security Toolbox: Defense in Depth

By Munawar Hossain Criminals know that easily-obtained data can help them craft a compelling attack campaign. Here are some essential tools defenders must have to thwart these sophisticated attacks. Source:: Cisco Security Notice