The Internet of Things Is Not Always So Comforting

By Talos Group Over the past few years, the Internet of Things (IoT) has emerged as reality with the advent of smart refrigerators, smart HVAC systems, smart TVs, and more. Embedding internet-enabled devices into everything presents new opportunities in connecting these systems to each other, making them “smarter,” and making our lives more convenient than ever before. Despite the new possibilities, there are major concerns about the IoT which inspire a legitimate question: “What happens if it’s not ‘done right‘ and there are []

Source:: Cisco Security Notice

Vulnerability Spotlight: Libgraphite Font Processing Vulnerabilities

By Talos Group Vulnerabilities Discovered by Yves Younan of Cisco Talos. Talos is releasing an advisory for four vulnerabilities that have been found within the Libgraphite library, which is used for font processing in Linux, Firefox, OpenOffice, and other major applications. The most severe vulnerability results from an out-of-bounds read which the attacker can use to achieve arbitrary code execution. A second vulnerability is an exploitable heap overflow. Finally, the last two vulnerabilities result in denial of service situations. To exploit these vulnerabilities, an attacker []

Source:: Cisco Security Notice

Vulnerability Spotlight: Libgraphite Font Processing Vulnerabilities

By Talos Group Vulnerabilities Discovered by Yves Younan of Cisco Talos. Talos is releasing an advisory for four vulnerabilities that have been found within the Libgraphite library, which is used for font processing in Linux, Firefox, OpenOffice, and other major applications. The most severe vulnerability results from an out-of-bounds read which the attacker can use to achieve arbitrary code execution. A second vulnerability is an exploitable heap overflow. Finally, the last two vulnerabilities result in denial of service situations. To exploit these vulnerabilities, an attacker []

Source:: Cisco Security Notice

Cisco Hosting Amsterdam 2016 FIRST Technical Colloquium

By Matt Valites We’d like to announce a “Save the Date” and “Call for Speakers” for the FIRST Amsterdam Technical Colloquium (TC) 2016 . The event, hosted by Cisco Systems in Amsterdam, Netherlands will be a plenary style conference held on the 19th and 20th of April 2016. Event registration is open now. This will be free event with no registration charges (although registration is required). This event will be open to all (not just FIRST members). Please register here . A list of recommended hotels and travel information is available on our website . Call []

Source:: Cisco Security Notice

Cisco Hosting Amsterdam 2016 FIRST Technical Colloquium

By Matt Valites We’d like to announce a “Save the Date” and “Call for Speakers” for the FIRST Amsterdam Technical Colloquium (TC) 2016 . The event, hosted by Cisco Systems in Amsterdam, Netherlands will be a plenary style conference held on the 19th and 20th of April 2016. Event registration is open now. This will be free event with no registration charges (although registration is required). This event will be open to all (not just FIRST members). Please register here . A list of recommended hotels and travel information is available on our website . Call []

Source:: Cisco Security Notice

Find Advanced Threats with Cisco Cognitive Threat Analytics

By Joe Malenfant Attackers are constantly innovating, employing more sophisticated techniques to compromise organizations and gain access to other parts of the network and sensitive data including proprietary information, trade secrets, and of course financial information. Threats have evolved to the point that it’s no longer feasible to simply defend the perimeter. In the 2016 Cisco Annual Security Report , Cisco researchers analyzed threat intelligence and examine some of the most compelling trends in attack vectors, attack methods and vulnerabilities. The report called out that malicious browser add-ons, []

Source:: Cisco Security Notice

Find Advanced Threats with Cisco Cognitive Threat Analytics

By Joe Malenfant Attackers are constantly innovating, employing more sophisticated techniques to compromise organizations and gain access to other parts of the network and sensitive data including proprietary information, trade secrets, and of course financial information. Threats have evolved to the point that it’s no longer feasible to simply defend the perimeter. In the 2016 Cisco Annual Security Report , Cisco researchers analyzed threat intelligence and examine some of the most compelling trends in attack vectors, attack methods and vulnerabilities. The report called out that malicious browser add-ons, []

Source:: Cisco Security Notice

Cisco AMP for Endpoints Adds New Features

By John Dominguez The threat landscape is ever-changing. Attackers continue to innovate and refine their tactics, and malware is more sophisticated than ever. New threats are surfacing every day, like the Angler exploit kit and the SSHPsychos DDoS attack. According to the 2016 Cisco Annual Security Report , ransomware is exploding, Adobe Flash vulnerabilities continue to be popular with cybercriminals, and malicious browser extensions continue to be a main source of data leakage for businesses. But of all the threats out there today, malware still reigns supreme. In []

Source:: Cisco Security Notice

Cisco AMP for Endpoints Adds New Features

By John Dominguez The threat landscape is ever-changing. Attackers continue to innovate and refine their tactics, and malware is more sophisticated than ever. New threats are surfacing every day, like the Angler exploit kit and the SSHPsychos DDoS attack. According to the 2016 Cisco Annual Security Report , ransomware is exploding, Adobe Flash vulnerabilities continue to be popular with cybercriminals, and malicious browser extensions continue to be a main source of data leakage for businesses. But of all the threats out there today, malware still reigns supreme. In []

Source:: Cisco Security Notice

Are you protecting your organization with comprehensive security and trust?

By Anthony Grieco With cyber threats escalating, security has emerged as a critical business driver and competitive differentiator. Organizations that successfully embed security throughout their network infrastructure, policies, processes, and culture are able to reduce risk while creating sustainable business advantage. At CiscoLive Berlin this year, we will examine how Cisco is building foundational security into the underlying architecture of our solutions as well as throughout our business operations to enhance the security of our products, our customers, and our company. Technical seminar TECSEC-4000 at []

Source:: Cisco Security Notice