Cisco Meraki MX Just Got Better at Fighting Advanced Threats

By Lindsay van Gemert Cisco redefines what a UTM can be with AMP and Threat Grid for Meraki MX Cybercriminals don’t discriminate – every organization is a target. With the threat landscape continuing to evolve and ever expanding connectivity, digitization and the Internet of Everything (IoE) it has never been more important to have powerful security tools at your […]

Source:: Cisco Security Notice

Cisco Stealthwatch Learning Network License for your digital-ready network

By Beth Barach Activate your Cisco network as a sensor and enforcer for branch-level threat detection and response Return on investment. We often hear this phrase not only in business, but also in life. For example, when choosing home renovation projects, conventional wisdom says that updating a kitchen will yield greater return on investment than creating a guest […]

Source:: Cisco Security Notice

Cisco Stealthwatch Learning Network License for your digital-ready network

By Beth Barach Activate your Cisco network as a sensor and enforcer for branch-level threat detection and response Return on investment. We often hear this phrase not only in business, but also in life. For example, when choosing home renovation projects, conventional wisdom says that updating a kitchen will yield greater return on investment than creating a guest […]

Source:: Cisco Security Notice

More Effective Security, Made Simple

By Scott Harrell Every day companies are turning to digital to create new customer experiences, new business models and gain greater efficiencies. But all the while, attackers continue to advance. To defend against aggressive adversaries, security must advance to more effective solutions that are simple, automated and open. Why? Let’s take a look at a scenario that could […]

Source:: Cisco Security Notice

More Effective Security, Made Simple

By Scott Harrell Every day companies are turning to digital to create new customer experiences, new business models and gain greater efficiencies. But all the while, attackers continue to advance. To defend against aggressive adversaries, security must advance to more effective solutions that are simple, automated and open. Why? Let’s take a look at a scenario that could […]

Source:: Cisco Security Notice

When Paying Out Doesn’t Pay Off

By Talos Group This blog post was authored by Edmund Brumaghin and Warren Mercer Summary Talos recently observed a new ransomware variant targeting users. This ransomware shows that new threat actors are continuing to enter the ransomware market at a rapid pace due to the lucrative nature of this business model. As a result, greater numbers of unique […]

Source:: Cisco Security Notice

When Paying Out Doesn’t Pay Off

By Talos Group This blog post was authored by Edmund Brumaghin and Warren Mercer Summary Talos recently observed a new ransomware variant targeting users. This ransomware shows that new threat actors are continuing to enter the ransomware market at a rapid pace due to the lucrative nature of this business model. As a result, greater numbers of unique […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Local Code Execution via the Intel HD Graphics Windows Kernel Driver

By Talos Group This vulnerability was discovered by Piotr Bania. Talos, in coordination with Intel, is disclosing the discovery of TALOS-2016-0087, a local arbitrary code execution vulnerability within the Intel HD Graphics Windows Kernel Driver. This vulnerability exists in the communication functionality of the driver and can be exploited if a specially crafted message is sent to the […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Local Code Execution via the Intel HD Graphics Windows Kernel Driver

By Talos Group This vulnerability was discovered by Piotr Bania. Talos, in coordination with Intel, is disclosing the discovery of TALOS-2016-0087, a local arbitrary code execution vulnerability within the Intel HD Graphics Windows Kernel Driver. This vulnerability exists in the communication functionality of the driver and can be exploited if a specially crafted message is sent to the […]

Source:: Cisco Security Notice

Connecting the Dots Reveals Crimeware Shake-up

By Talos Group This Post Authored by Nick Biasini For a couple of weeks in June the threat landscape was changed. Several high profile threats fell off the landscape, causing a shake-up that hadn’t been seen before. For a period of three weeks the internet was safer, if only for a short time. Still to date the Angler […]

Source:: Cisco Security Notice