Microsoft Patch Tuesday – December 2016

By Talos Group The final patch Tuesday of 2016 has arrived. Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release contains 12 bulletins addressing 48 vulnerabilities. Six bulletins are rated critical and address vulnerabilities in Internet Explorer, Edge, Microsoft Graphics Components, Microsoft Uniscribe, and Adobe Flash […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Joyent SmartOS

By Talos Group Vulnerability discovered by Tyler Bohan Overview Talos is disclosing a series of vulnerabilities in Joyent SmartOS, specifically in the Hyprlofs filesystem. SmartOS is an open source hypervisor that is based on a branch of Opensolaris. Hyperlofs is a SmartOS in-memory filesystem that allows users to map files from various different locations under a single namespace. […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Joyent SmartOS

By Talos Group Vulnerability discovered by Tyler Bohan Overview Talos is disclosing a series of vulnerabilities in Joyent SmartOS, specifically in the Hyprlofs filesystem. SmartOS is an open source hypervisor that is based on a branch of Opensolaris. Hyperlofs is a SmartOS in-memory filesystem that allows users to map files from various different locations under a single namespace. […]

Source:: Cisco Security Notice

Why the “Seven Steps of Cyber Resilience” Prove Critical for Digital Transformation

By Anthony Grieco Organizations aren’t just talking about digital transformation – they’re doing it: More than 75 percent of global business leaders cite digitization as a top strategic priority and nearly seven in ten say their company will meet its digital transformation objectives this year, according to a recent survey from The Economist Intelligence Unit. To advance these […]

Source:: Cisco Security Notice

Why the “Seven Steps of Cyber Resilience” Prove Critical for Digital Transformation

By Anthony Grieco Organizations aren’t just talking about digital transformation – they’re doing it: More than 75 percent of global business leaders cite digitization as a top strategic priority and nearly seven in ten say their company will meet its digital transformation objectives this year, according to a recent survey from The Economist Intelligence Unit. To advance these […]

Source:: Cisco Security Notice

Prevent, Detect and Respond with Cisco AMP for Endpoints

By John Dominguez Cyberattacks are ever evolving to circumvent and evade “protection-only” technologies. Despite your best efforts to protect against compromise, a persistent attacker will eventually breach your defenses and get inside. Then what? IT security teams need to automatically detect a threat when it gets in. They need to know where it came from, how it entered, […]

Source:: Cisco Security Notice

Prevent, Detect and Respond with Cisco AMP for Endpoints

By John Dominguez Cyberattacks are ever evolving to circumvent and evade “protection-only” technologies. Despite your best efforts to protect against compromise, a persistent attacker will eventually breach your defenses and get inside. Then what? IT security teams need to automatically detect a threat when it gets in. They need to know where it came from, how it entered, […]

Source:: Cisco Security Notice

Floki Bot Strikes, Talos and Flashpoint Respond

By Talos Group This blog post was authored by Ben Baker, Edmund Brumaghin, Mariano Graziano, and Jonas Zaddach Executive Summary Floki Bot is a new malware variant that has recently been offered for sale on various darknet markets. It is based on the same codebase that was used by the infamous Zeus trojan, the source code of which […]

Source:: Cisco Security Notice

Floki Bot Strikes, Talos and Flashpoint Respond

By Talos Group This blog post was authored by Ben Baker, Edmund Brumaghin, Mariano Graziano, and Jonas Zaddach Executive Summary Floki Bot is a new malware variant that has recently been offered for sale on various darknet markets. It is based on the same codebase that was used by the infamous Zeus trojan, the source code of which […]

Source:: Cisco Security Notice

FIPS and Deterministic ECDSA: Achieving robust security and conformance

By Panos Kampanakis Digital signatures are used to verify the authenticity of a message. For example, when a message is signed, the verifier can rest assured that only the signer could have signed it. ECDSA and DSA are two widely used, standardized digital signature schemes. In order to sign a message, internally both of them require the use […]

Source:: Cisco Security Notice