Securing Medical Devices – The Need for a Different Approach – Part 2

By Richard Staynings When I ask the question of Healthcare CIOs and CISOs “What keeps you up at night?” one of the most common answers I receive – after the usual jokes about indigestion, or the snoring spouse, is the problem of what to do about securing medical devices in our hospitals. Most healthcare executives are acutely aware […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Information Disclosure Vulnerability in Lexmark Perceptive Document Filters

By Talos Group Discovered by Marcin ‘Icewall‘ Noga of Cisco Talos. Talos are today releasing a new vulnerability discovered within the Lexmark Perceptive Document Filters library. TALOS-2017-0302 allows for information disclosure using specifically crafted files. Overview The vulnerability is present in the Lexmark Document filter parsing engine which is used across a wide range of services such as […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Information Disclosure Vulnerability in Lexmark Perceptive Document Filters

By Talos Group Discovered by Marcin ‘Icewall‘ Noga of Cisco Talos. Talos are today releasing a new vulnerability discovered within the Lexmark Perceptive Document Filters library. TALOS-2017-0302 allows for information disclosure using specifically crafted files. Overview The vulnerability is present in the Lexmark Document filter parsing engine which is used across a wide range of services such as […]

Source:: Cisco Security Notice

Demanding a Plan for Cyber Resilience in the IoT

By Anthony Grieco Earlier this month, I wrote about the need for a holistic security strategy for the Internet of Things (IoT). It’s more than securing a ‘thing‘ within the IoT – it’s about building resilience for the whole system. Cyber resilience is about managing risk; identifying potential risks, evaluating the likelihood of them occurring and their negative […]

Source:: Cisco Security Notice

Demanding a Plan for Cyber Resilience in the IoT

By Anthony Grieco Earlier this month, I wrote about the need for a holistic security strategy for the Internet of Things (IoT). It’s more than securing a ‘thing‘ within the IoT – it’s about building resilience for the whole system. Cyber resilience is about managing risk; identifying potential risks, evaluating the likelihood of them occurring and their negative […]

Source:: Cisco Security Notice

Securing Medical Devices – The Need for a Different Approach – Part 1

By Richard Staynings When I ask the question of Healthcare CIOs and CISOs “What keeps you up at night?” one of the most common answers I receive – after the usual jokes about indigestion, or the snoring spouse, is the problem of what to do about securing medical devices in our hospitals. Most healthcare executives are acutely aware […]

Source:: Cisco Security Notice

Securing Medical Devices – The Need for a Different Approach – Part 1

By Richard Staynings When I ask the question of Healthcare CIOs and CISOs “What keeps you up at night?” one of the most common answers I receive – after the usual jokes about indigestion, or the snoring spouse, is the problem of what to do about securing medical devices in our hospitals. Most healthcare executives are acutely aware […]

Source:: Cisco Security Notice

Cisco Coverage for Shadow Brokers 2017-04-14 Information Release

By Talos Group On Friday, April 14, the actor group identifying itself as the Shadow Brokers released new information containing exploits for previously disclosed and undisclosed vulnerabilities that affect various versions of Microsoft Windows, as well as applications such as Lotus Domino. Additionally, the release included previously unknown tools, including an exploitation framework identified as “FUZZBUNCH”. Several of […]

Source:: Cisco Security Notice

Cisco Coverage for Shadow Brokers 2017-04-14 Information Release

By Talos Group On Friday, April 14, the actor group identifying itself as the Shadow Brokers released new information containing exploits for previously disclosed and undisclosed vulnerabilities that affect various versions of Microsoft Windows, as well as applications such as Lotus Domino. Additionally, the release included previously unknown tools, including an exploitation framework identified as “FUZZBUNCH”. Several of […]

Source:: Cisco Security Notice

Threat Round-up for Apr 7 – Apr 14

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between April 7 and April 14. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

Source:: Cisco Security Notice