Threat-Focused NG-Firewall – Who Cares? Part 2

By Mike Storm This is Part 2 of our blog series about NG-Firewalls. See Part 1 here . Part 2: Enter Threat-Focused NG-Firewall What does a Threat-focused NG-Firewall do differently? Just about everything. Let’s compare the most popular NGFW systems on the market (typical NGFW) with the Cisco Firepower NG-Firewall system, (a Threat-Focused NG-Firewall). If you consider the typical NGFW available from your choice of vendors, you are staring at a system that was designed for, and normally sold to, Network-focused Admins that need more []

Source:: Cisco Security Notice

Threat-Focused NG-Firewall – Who Cares? Part 1

By Mike Storm Part 1: Rude Awakening Let us begin with some context in the form of a story. I live in a very bad part of town and I am always worried that my car is going to get stolen or broken into. So, I just invested over a thousand bucks in this awesome vehicle alarm and security system. You know, one of those ultra-advanced systems that connects to an app on your smartphone, includes an ignition kill switch, vehicle tracker, cameras, motion []

Source:: Cisco Security Notice

Threat-Focused NG-Firewall – Who Cares? Part 1

By Mike Storm Part 1: Rude Awakening Let us begin with some context in the form of a story. I live in a very bad part of town and I am always worried that my car is going to get stolen or broken into. So, I just invested over a thousand bucks in this awesome vehicle alarm and security system. You know, one of those ultra-advanced systems that connects to an app on your smartphone, includes an ignition kill switch, vehicle tracker, cameras, motion []

Source:: Cisco Security Notice

Malware stealing gigabytes of your data as seen by Cognitive Threat Analytics

By Michal Svoboda This post is authored by Gayan de Silva and Martin Pospisil. Overview Recently, about 50 users across 20 companies were alarmed by the Cisco Cognitive Threat Analytics (CTA) about a malware that exfiltrates gigabytes of data from their computers. An example of such CTA detection: In addition to the usual malware command and control activities, the incident features an upload of 2.3 gigabytes of data to a highly suspicious destination. CTA has classified this incident as a malware with high severity and confidence. []

Source:: Cisco Security Notice

Malware stealing gigabytes of your data as seen by Cognitive Threat Analytics

By Michal Svoboda This post is authored by Gayan de Silva and Martin Pospisil. Overview Recently, about 50 users across 20 companies were alarmed by the Cisco Cognitive Threat Analytics (CTA) about a malware that exfiltrates gigabytes of data from their computers. An example of such CTA detection: In addition to the usual malware command and control activities, the incident features an upload of 2.3 gigabytes of data to a highly suspicious destination. CTA has classified this incident as a malware with high severity and confidence. []

Source:: Cisco Security Notice

Introducing the Cisco PSIRT openVuln API

By Omar Santos In October, we announced details about Cisco PSIRT’s new and improved security vulnerability disclosure format. Our Chief Security and Trust Officer, John Stewart, also revealed that Cisco will launch an application programming interface (API) that empowers customers to customize Cisco vulnerability information and publications. Today, we have officially launched the Cisco PSIRT openVuln API and it is available for immediate use. The Cisco PSIRT openVuln API is a RESTful API that allows customers to obtain Cisco security vulnerability information in different machine-consumable formats. It supports industrywide security []

Source:: Cisco Security Notice

Introducing the Cisco PSIRT openVuln API

By Omar Santos In October, we announced details about Cisco PSIRT’s new and improved security vulnerability disclosure format. Our Chief Security and Trust Officer, John Stewart, also revealed that Cisco will launch an application programming interface (API) that empowers customers to customize Cisco vulnerability information and publications. Today, we have officially launched the Cisco PSIRT openVuln API and it is available for immediate use. The Cisco PSIRT openVuln API is a RESTful API that allows customers to obtain Cisco security vulnerability information in different machine-consumable formats. It supports industrywide security []

Source:: Cisco Security Notice

New Cisco Rapid Threat Containment Solution Detects and Automatically Contains Threats

By Dan Stotts Integration of Cisco FireSIGHT Management Center and Identity Services Engine (ISE) Now Available As explained in our 2015 Cisco Midyear Security Report, attackers are using innovative tactics like exploit kits, ransomware, and advanced malware to evade detection. Organizations are using as many as 40 to 60+ disparate security solutions that typically don’t – and can’t – work together. These point solutions have limited impact against well-funded cybercriminals and typically generate vast numbers of alerts, many of which may not be relevant. On average, large organizations []

Source:: Cisco Security Notice

New Cisco Rapid Threat Containment Solution Detects and Automatically Contains Threats

By Dan Stotts Integration of Cisco FireSIGHT Management Center and Identity Services Engine (ISE) Now Available As explained in our 2015 Cisco Midyear Security Report, attackers are using innovative tactics like exploit kits, ransomware, and advanced malware to evade detection. Organizations are using as many as 40 to 60+ disparate security solutions that typically don’t – and can’t – work together. These point solutions have limited impact against well-funded cybercriminals and typically generate vast numbers of alerts, many of which may not be relevant. On average, large organizations []

Source:: Cisco Security Notice

Threat Spotlight: Cryptowall 4 – The Evolution Continues

By Talos Group This post is authored by Andrea Allievi and Holger Unterbrink with contributions from Warren Mercer . Executive Summary Over the past year, Talos has devoted a significant amount of time to better understanding how ransomware operates, its relation to other malware, and its economic impact. This research has proven valuable for Talos and led the development of better detection methods within the products we support along with the disruption of adversarial operations . CryptoWall is one ransomware variant that has shown gradual evolution over the past year with []

Source:: Cisco Security Notice