Advanced Malware Evasion Techniques HTTP-Evader

By John Klimarchuk Malware doesn’t play by the rules, so today’s IT infrastructure needs to provide several layers of defense for end-users. Some of the more common devices used to protect modern networks are Intrusion Prevention systems (IPS) and Firewalls. In recent years, there has been a lot of research on how evasion techniques bypass Intrusion Prevention systems […]

Source:: Cisco Security Notice

Planes, trains, and automobiles – if it’s on your network, Cisco ISE can see it

By Dan Stotts Planes, trains, and automobiles – if it’s on your network, Cisco ISE can see it in minutes and control its access dynamically at scale. Networks are increasingly distributed and more devices are connecting to your network every day. Research finds that 300 billion devices will be connected to the Internet by 2030, up from 50 […]

Source:: Cisco Security Notice

Planes, trains, and automobiles – if it’s on your network, Cisco ISE can see it

By Dan Stotts Planes, trains, and automobiles – if it’s on your network, Cisco ISE can see it in minutes and control its access dynamically at scale. Networks are increasingly distributed and more devices are connecting to your network every day. Research finds that 300 billion devices will be connected to the Internet by 2030, up from 50 […]

Source:: Cisco Security Notice

Closing the talent gap to secure the future: Cisco rolls out $10 million cybersecurity scholarship

By Tejas R Vashi Finding – and keeping – the cybersecurity talent required for today’s digital economy is a serious challenge. And it’s getting worse. Here at Cisco, we’re perpetually hearing from employers and hiring managers about their struggles with the growing cybersecurity skills gap. How bad is it? Well, the RSA Conference and ISACA’s State of Cybersecurity: Implications […]

Source:: Cisco Security Notice

Closing the talent gap to secure the future: Cisco rolls out $10 million cybersecurity scholarship

By Tejas R Vashi Finding – and keeping – the cybersecurity talent required for today’s digital economy is a serious challenge. And it’s getting worse. Here at Cisco, we’re perpetually hearing from employers and hiring managers about their struggles with the growing cybersecurity skills gap. How bad is it? Well, the RSA Conference and ISACA’s State of Cybersecurity: Implications […]

Source:: Cisco Security Notice

TeslaCrypt: The Battle is Over

By Talos Group Talos has updated its TeslaCrypt decryptor tool, which now works with any version of this variant of ransomware. You can download the decryptor here. When Talos first examined TeslaCrypt version 1.0 in April of 2015, we articulated how this ransomware operated and were able to develop a decryptor. Soon thereafter, TeslaCrypt version 2.0 was released, […]

Source:: Cisco Security Notice

TeslaCrypt: The Battle is Over

By Talos Group Talos has updated its TeslaCrypt decryptor tool, which now works with any version of this variant of ransomware. You can download the decryptor here. When Talos first examined TeslaCrypt version 1.0 in April of 2015, we articulated how this ransomware operated and were able to develop a decryptor. Soon thereafter, TeslaCrypt version 2.0 was released, […]

Source:: Cisco Security Notice

Detection in Depth

By Gavin Reid Defense in depth is a well understood and widely implemented approach that can better secure your organization’s network. It works by placing multiple layers of defense throughout the network to create a series of overlapping and redundant defenses. If one layer fails, there will still be other defenses that remain intact. However, a lesser known […]

Source:: Cisco Security Notice

Detection in Depth

By Gavin Reid Defense in depth is a well understood and widely implemented approach that can better secure your organization’s network. It works by placing multiple layers of defense throughout the network to create a series of overlapping and redundant defenses. If one layer fails, there will still be other defenses that remain intact. However, a lesser known […]

Source:: Cisco Security Notice

Vulnerability Spotlight: PDFium Vulnerability in Google Chrome Web Browser

By Talos Group This vulnerability was discovered by Aleksandar Nikolic of Cisco Talos. PDFium is the default PDF reader that is included in the Google Chrome web browser. Talos has identified an exploitable heap buffer overflow vulnerability in the Pdfium PDF reader. By simply viewing a PDF document that includes an embedded jpeg2000 image, the attacker can achieve […]

Source:: Cisco Security Notice