Vulnerability Spotlight: Exploiting the Aerospike Database Server

By Talos Group Vulnerabilities discovered by Talos Talos is disclosing multiple vulnerabilities discovered in the Aerospike Database Server. These vulnerabilities range from memory disclosure to potential remote code execution. This software is used by various companies that require a high performance NoSQL database. The Aerospike Database Server is both a distributed and scalable NoSQL database that is used […]

Source:: Cisco Security Notice

2016 – What a Year for Cisco Security

By Jason Lamar What a giant year for Cisco Security! In 2016, we pursued our effective security architecture with innovative solutions – from the network to the endpoint to the cloud. I couldn’t be more proud of our team and the strides we made to bring together so many elements of our architecture in an integrated approach that […]

Source:: Cisco Security Notice

2016 – What a Year for Cisco Security

By Jason Lamar What a giant year for Cisco Security! In 2016, we pursued our effective security architecture with innovative solutions – from the network to the endpoint to the cloud. I couldn’t be more proud of our team and the strides we made to bring together so many elements of our architecture in an integrated approach that […]

Source:: Cisco Security Notice

Microsoft Patch Tuesday – January 2017

By Talos Group Happy New Year to our readers! Today marks the first Patch Tuesday of 2017 with Microsoft releasing their monthly set of bulletins designed to address security vulnerabilities. This month’s release is relatively light with 4 bulletins addressing 3 vulnerabilities. Two bulletins are rated critical and address vulnerabilities in Office and Adobe Flash Player while the […]

Source:: Cisco Security Notice

Microsoft Patch Tuesday – January 2017

By Talos Group Happy New Year to our readers! Today marks the first Patch Tuesday of 2017 with Microsoft releasing their monthly set of bulletins designed to address security vulnerabilities. This month’s release is relatively light with 4 bulletins addressing 3 vulnerabilities. Two bulletins are rated critical and address vulnerabilities in Office and Adobe Flash Player while the […]

Source:: Cisco Security Notice

Cisco Coverage for ‘GRIZZLY STEPPE’

By Talos Group Over the past several weeks, there have been ongoing discussions regarding cyber attacks that have occurred against several political, governmental, and private sector entities in the United States. These discussions have revolved around allegations that these cyber attacks were designed to interfere with the 2016 U.S. Federal Elections as well as identifying who is responsible […]

Source:: Cisco Security Notice

Cisco Coverage for ‘GRIZZLY STEPPE’

By Talos Group Over the past several weeks, there have been ongoing discussions regarding cyber attacks that have occurred against several political, governmental, and private sector entities in the United States. These discussions have revolved around allegations that these cyber attacks were designed to interfere with the 2016 U.S. Federal Elections as well as identifying who is responsible […]

Source:: Cisco Security Notice

The impact on network security through encrypted protocols – HTTP/2

By Tobias Mayer This is the start of a planned series of posts around the impact that new protocols are making on the way many of us deal with network security today. The protocols we have been using on the internet, mainly TCP with HTTP 1.1, have shown that they cannot deal with today’s requirements for fast and […]

Source:: Cisco Security Notice

The impact on network security through encrypted protocols – HTTP/2

By Tobias Mayer This is the start of a planned series of posts around the impact that new protocols are making on the way many of us deal with network security today. The protocols we have been using on the internet, mainly TCP with HTTP 1.1, have shown that they cannot deal with today’s requirements for fast and […]

Source:: Cisco Security Notice

IEC 104 Protocol Detection Rules

By Talos Group IEC 60870-5-104 Protocol Detection Rules Cisco Talos has released 33 Snort rules which are used to analyze/inspect IEC 60870-5-104 network traffic. These rules will help Industrial Control Systems/Supervisory Control and Data Acquisition (ICS/SCADA) asset owners to allow the identification of both normal and abnormal traffic in their environments. In order for these rules to be […]

Source:: Cisco Security Notice