Threat Spotlight: Mighty Morphin Malware Purveyors: Locky Returns Via Necurs

By Talos Group This post was authored by Nick Biasini Throughout the majority of 2016, Locky was the dominant ransomware in the threat landscape. It was an early pioneer when it came to using scripting formats Windows hosts would natively handle, like .js, .wsf, and .hta. These scripting formats acted as a vehicle to deliver the payload via […]

Source:: Cisco Security Notice

Threat Round-up for Apr 14 – Apr 21

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between April 14 and April 21. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

Source:: Cisco Security Notice

Threat Round-up for Apr 14 – Apr 21

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between April 14 and April 21. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

Source:: Cisco Security Notice

Secure Access Done Right: Cisco ISE Wins the SC Magazine 2017 Award for Best NAC Solution

By Dan Stotts At the most recent RSA Conference, SC Magazine awarded Cisco Identity Services Engine (ISE) the top spot for Best NAC Solution. In the words of the award panel, “this honor goes to vendors and practitioners who make a difference… and detect, respond and recover from cyber attacks.”[1] Network Access Control (NAC) solutions have been around […]

Source:: Cisco Security Notice

Secure Access Done Right: Cisco ISE Wins the SC Magazine 2017 Award for Best NAC Solution

By Dan Stotts At the most recent RSA Conference, SC Magazine awarded Cisco Identity Services Engine (ISE) the top spot for Best NAC Solution. In the words of the award panel, “this honor goes to vendors and practitioners who make a difference… and detect, respond and recover from cyber attacks.”[1] Network Access Control (NAC) solutions have been around […]

Source:: Cisco Security Notice

Vulnerability Spotlight: ARM Mbedtls x509 ECDSA invalid public key Code Execution Vulnerability

By Talos Group Vulnerability Discovered by Aleksandar Nikolic Overview Talos is disclosing TALOS-2017-0274/CVE-2017-2784, a code execution vulnerability in ARM MbedTLS. This vulnerability is specifically related to how MbedTLS handles x509 certificates. MbedTLS is an SSL/TLS implementation aimed specifically at embedded devices that was previously known as PolarSSL. The vulnerability exists in the part of the code responsible […]

Source:: Cisco Security Notice

Vulnerability Spotlight: ARM Mbedtls x509 ECDSA invalid public key Code Execution Vulnerability

By Talos Group Vulnerability Discovered by Aleksandar Nikolic Overview Talos is disclosing TALOS-2017-0274/CVE-2017-2784, a code execution vulnerability in ARM MbedTLS. This vulnerability is specifically related to how MbedTLS handles x509 certificates. MbedTLS is an SSL/TLS implementation aimed specifically at embedded devices that was previously known as PolarSSL. The vulnerability exists in the part of the code responsible […]

Source:: Cisco Security Notice

How to Choose a Next-Generation Endpoint Security Solution

By John Dominguez When organizations begin their search for an advanced, next-generation endpoint security solution to protect PCs, Macs, servers, and mobile devices, they have a lot of different vendors to choose from and a lot of questions. Can it prevent attacks? What kind of malware can it protect against? What if malware gets in, can it still […]

Source:: Cisco Security Notice

How to Choose a Next-Generation Endpoint Security Solution

By John Dominguez When organizations begin their search for an advanced, next-generation endpoint security solution to protect PCs, Macs, servers, and mobile devices, they have a lot of different vendors to choose from and a lot of questions. Can it prevent attacks? What kind of malware can it protect against? What if malware gets in, can it still […]

Source:: Cisco Security Notice

Securing Medical Devices – The Need for a Different Approach – Part 2

By Richard Staynings When I ask the question of Healthcare CIOs and CISOs “What keeps you up at night?” one of the most common answers I receive – after the usual jokes about indigestion, or the snoring spouse, is the problem of what to do about securing medical devices in our hospitals. Most healthcare executives are acutely aware […]

Source:: Cisco Security Notice