How to Increase the Presence – and Impact – of Women in Cybersecurity

By Michele Guel This blog is the first in a series of posts featuring perspectives from Cisco women in security. Next month’s blog will feature Chief Privacy Officer, Michelle Dennedy. When I started my information security career at NASA’s Ames Research Center in 1988, there were very few women in the field. In fact, I’d attend conferences in […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Certificate Validation Flaw in Apple macOS and iOS Identified and Patched

By Talos Group Most people don’t give much thought to what happens when you connect to your bank’s website or log in to your email account. For most people, securely connecting to a website seems as simple as checking to make sure the little padlock in the address bar is present. However, in the background there are many […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Certificate Validation Flaw in Apple macOS and iOS Identified and Patched

By Talos Group Most people don’t give much thought to what happens when you connect to your bank’s website or log in to your email account. For most people, securely connecting to a website seems as simple as checking to make sure the little padlock in the address bar is present. However, in the background there are many […]

Source:: Cisco Security Notice

Tabletops Aren’t Just For Eating Dinner On

By Shelly Giesbrecht How to take your Incident Response plan to the next level ‘Practice does everything‘ – Periander (Often misquoted as ‘Practice makes perfect‘) You’ve gone through the work of creating an incident response (IR) plan, created some runbooks to deal with likely, known threats, and you’re feeling a lot better about the ability of your organization’s ability […]

Source:: Cisco Security Notice

Tabletops Aren’t Just For Eating Dinner On

By Shelly Giesbrecht How to take your Incident Response plan to the next level ‘Practice does everything‘ – Periander (Often misquoted as ‘Practice makes perfect‘) You’ve gone through the work of creating an incident response (IR) plan, created some runbooks to deal with likely, known threats, and you’re feeling a lot better about the ability of your organization’s ability […]

Source:: Cisco Security Notice

Threat Round-up for the Week of Mar 20 – Mar 24

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed over the past week. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically protected from […]

Source:: Cisco Security Notice

Threat Round-up for the Week of Mar 20 – Mar 24

By Talos Group Talos is publishing a summary glimpse into the most prevalent threats observed over the past week.

Source:: Cisco Security Notice

Threat Round-up for the Week of Mar 20 – Mar 24

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed over the past week. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically protected from […]

Source:: Cisco Security Notice

Threat Round-up for the Week of Mar 20 – Mar 24

By Talos Group Talos is publishing a summary glimpse into the most prevalent threats observed over the past week.

Source:: Cisco Security Notice

How Malformed RTF Defeats Security Engines

By Talos Group This post is authored by Paul Rascagneres with contributions from Alex McDonnell Executive Summary Talos has discovered a new spam campaign used to infect targets with the well known Loki Bot stealer. The infection vector is an RTF document abusing an old exploit (CVE-2012-1856), however the most interesting part is the effort put into the […]

Source:: Cisco Security Notice