The Mutiny Fuzzing Framework and Decept Proxy

By Talos Group This blog post is authored by James Spadaro of Cisco ASIG and Lilith Wyatt of Cisco Talos. Imagine a scenario where you, as a vulnerability researcher, are tasked with auditing a network application to identify vulnerabilities. By itself, the task may not seem too daunting until you learn of a couple conditions and constraints: you […]

Source:: Cisco Security Notice

The Mutiny Fuzzing Framework and Decept Proxy

By Talos Group This blog post is authored by James Spadaro of Cisco ASIG and Lilith Wyatt of Cisco Talos. Imagine a scenario where you, as a vulnerability researcher, are tasked with auditing a network application to identify vulnerabilities. By itself, the task may not seem too daunting until you learn of a couple conditions and constraints: you […]

Source:: Cisco Security Notice

Cisco Cloudlock joins the Box Trust ecosystem

By Russell Miller We live in an age where technology is core to business and can impact success. Staying competitive requires adopting and adapting to new technology. Direct correlation can be drawn to the pace of innovation and collaboration among teams. Companies spend billions of dollars every year to implement solutions that help teams collaborate faster, easier, and […]

Source:: Cisco Security Notice

Cisco Cloudlock joins the Box Trust ecosystem

By Russell Miller We live in an age where technology is core to business and can impact success. Staying competitive requires adopting and adapting to new technology. Direct correlation can be drawn to the pace of innovation and collaboration among teams. Companies spend billions of dollars every year to implement solutions that help teams collaborate faster, easier, and […]

Source:: Cisco Security Notice

Recam Redux – DeConfusing ConfuserEx

By Talos Group Overview This report shows how to deobfuscate a custom .NET ConfuserEx protected malware. We identified this recent malware campaign from our Advanced Malware Protection (AMP) telemetry. Initial infection is via a malicious Word document, the malware ultimately executes in memory an embedded payload from the Recam family. Recam is an information stealer. Although the malware […]

Source:: Cisco Security Notice

Recam Redux – DeConfusing ConfuserEx

By Talos Group Overview This report shows how to deobfuscate a custom .NET ConfuserEx protected malware. We identified this recent malware campaign from our Advanced Malware Protection (AMP) telemetry. Initial infection is via a malicious Word document, the malware ultimately executes in memory an embedded payload from the Recam family. Recam is an information stealer. Although the malware […]

Source:: Cisco Security Notice

You already own the most powerful security tool. Are you really using it? Really?

By Dan Stotts See and stop threats using your existing network. If you live in the United States, there’s a 44% chance your most valuable personal data were recently compromised[1]. The silver lining, if there is one, is that this breach compelled many to start actively monitoring their credit report for signs of suspicious activity. It often takes […]

Source:: Cisco Security Notice

You already own the most powerful security tool. Are you really using it? Really?

By Dan Stotts See and stop threats using your existing network. If you live in the United States, there’s a 44% chance your most valuable personal data were recently compromised[1]. The silver lining, if there is one, is that this breach compelled many to start actively monitoring their credit report for signs of suspicious activity. It often takes […]

Source:: Cisco Security Notice

Fortinet to Bring Together More than 2,000 Security Thought Leaders and IT Professionals at Accelerate 18

Fortinet to Bring Together More than 2,000 Security Thought Leaders and IT Professionals at Accelerate 18

Source:: Fortinet

Fortinet to Bring Together More than 2,000 Security Thought Leaders and IT Professionals at Accelerate 18

Fortinet to Bring Together More than 2,000 Security Thought Leaders and IT Professionals at Accelerate 18

Source:: Fortinet