Designing Security and Trust into the Cloud

By Steve Martino Cloud computing has reached a tipping point as many organizations have either adopted, or are planning to adopt, some form of cloud computing technology – whether IT knows and manages it or not. “Speed to capability” is one of the primary reasons that individuals, business units and departments are using cloud technology and service providers […]

Source:: Cisco Security Notice

Badlock Impact on Cisco Products

By Troy Fridley On April 12, 2016 the Samba.org project and Microsoft disclosed a vulnerability that is being referred to as Badlock. The Cisco Product Security Incident Response Team (PSIRT) is currently investigating the impacts of this vulnerability on Cisco products. Based on our initial analysis of the vulnerability, we expect minimal impact to Cisco products. If any […]

Source:: Cisco Security Notice

Badlock Impact on Cisco Products

By Troy Fridley On April 12, 2016 the Samba.org project and Microsoft disclosed a vulnerability that is being referred to as Badlock. The Cisco Product Security Incident Response Team (PSIRT) is currently investigating the impacts of this vulnerability on Cisco products. Based on our initial analysis of the vulnerability, we expect minimal impact to Cisco products. If any […]

Source:: Cisco Security Notice

Microsoft Patch Tuesday – April 2016

By Talos Group Patch Tuesday for April has arrived with Microsoft releasing their latest monthly set of security bulletins to address security vulnerabilities in their products. This month’s release contains 13 bulletins relating to 31 vulnerabilities. Six bulletins address vulnerabilities rated as critical in Edge, Graphic Components, Internet Explorer, XML Core Service, Microsoft Office and Adobe Flash Player. […]

Source:: Cisco Security Notice

Microsoft Patch Tuesday – April 2016

By Talos Group Patch Tuesday for April has arrived with Microsoft releasing their latest monthly set of security bulletins to address security vulnerabilities in their products. This month’s release contains 13 bulletins relating to 31 vulnerabilities. Six bulletins address vulnerabilities rated as critical in Edge, Graphic Components, Internet Explorer, XML Core Service, Microsoft Office and Adobe Flash Player. […]

Source:: Cisco Security Notice

Solving the Security Patchwork Problem

By John Dominguez Hackers today make it their job to understand your security technologies and how to exploit the gaps between them. And that’s the problem – there are a lot of gaps. In our own discussions with IT security pros, it isn’t unusual to find organizations that have deployed a patchwork of 40 to 60+ different security […]

Source:: Cisco Security Notice

Solving the Security Patchwork Problem

By John Dominguez Hackers today make it their job to understand your security technologies and how to exploit the gaps between them. And that’s the problem – there are a lot of gaps. In our own discussions with IT security pros, it isn’t unusual to find organizations that have deployed a patchwork of 40 to 60+ different security […]

Source:: Cisco Security Notice

Ransomware: Past, Present, and Future

By Talos Group The rise of ransomware over the past year is an ever growing problem. Business often believe that paying the ransom is the most cost effective way of getting their data back – and this may also be the reality. The problem we face is that every single business that pays to recover their files, […]

Source:: Cisco Security Notice

Ransomware: Past, Present, and Future

By Talos Group The rise of ransomware over the past year is an ever growing problem. Business often believe that paying the ransom is the most cost effective way of getting their data back – and this may also be the reality. The problem we face is that every single business that pays to recover their files, […]

Source:: Cisco Security Notice

Nuclear Drops Tor Runs and Hides

By Talos Group Introduction Exploit kits are constantly compromising users, whether it’s via malvertising or compromised websites, they are interacting with a large amount of users on a daily basis. Talos is continuously monitoring these exploit kits to ensure protection, analyze changes as they occur, and looking for shifts in payloads. Yesterday we observed a new technique in […]

Source:: Cisco Security Notice