Going back to school on IoT security – personal reflections from a cybersecurity product marketeer

By Story Tweedie-Yates Has anybody ever actively encouraged you to hack your own car? Did you know that hacking your car could mean diagnosing problems easily and for a lower cost than you would find at the local dealer? Did you know that the aviation industry has built in both safety and security from the ground up? How […]

Source:: Cisco Security Notice

Going back to school on IoT security – personal reflections from a cybersecurity product marketeer

By Story Tweedie-Yates Has anybody ever actively encouraged you to hack your own car? Did you know that hacking your car could mean diagnosing problems easily and for a lower cost than you would find at the local dealer? Did you know that the aviation industry has built in both safety and security from the ground up? How […]

Source:: Cisco Security Notice

September 2016 Cisco IOS & IOS XE Software Bundled Publication

By Erin Float Today, we released the last Cisco IOS & IOS XE Software Security Advisory Bundled Publication of 2016. (As a reminder, Cisco discloses vulnerabilities in Cisco IOS and IOS XE Software on a predictable schedule—the fourth Wednesday of March and September in each calendar year). Today’s edition of the Cisco IOS & IOS XE Software Security Advisory […]

Source:: Cisco Security Notice

September 2016 Cisco IOS & IOS XE Software Bundled Publication

By Erin Float Today, we released the last Cisco IOS & IOS XE Software Security Advisory Bundled Publication of 2016. (As a reminder, Cisco discloses vulnerabilities in Cisco IOS and IOS XE Software on a predictable schedule—the fourth Wednesday of March and September in each calendar year). Today’s edition of the Cisco IOS & IOS XE Software Security Advisory […]

Source:: Cisco Security Notice

Creating a “Kill Switch” in the Cybersecurity “Kill Chain”

By Scott Pope “Kill chain,” a cybersecurity term coined by Lockheed Martin, is shorthand for how cyber criminals target, recon, develop, and eventually penetrate their targets. It’s among the hottest buzzwords in the cybersecurity industry right now, with many security products talking about how they address the kill chain. But playing buzzword bingo in tech often results in […]

Source:: Cisco Security Notice

Creating a “Kill Switch” in the Cybersecurity “Kill Chain”

By Scott Pope “Kill chain,” a cybersecurity term coined by Lockheed Martin, is shorthand for how cyber criminals target, recon, develop, and eventually penetrate their targets. It’s among the hottest buzzwords in the cybersecurity industry right now, with many security products talking about how they address the kill chain. But playing buzzword bingo in tech often results in […]

Source:: Cisco Security Notice

Threat Spotlight: GozNym

By Talos Group This blog was authored by Ben Baker, Edmund Brumaghin, and Jonah Samost. Executive Summary GozNym is the combination of features from two previously identified families of malware, Gozi and Nymaim. Gozi was a widely distributed banking trojan with a known Domain Generation Algorithm (DGA) and also contained the ability to install a Master Boot Record […]

Source:: Cisco Security Notice

Threat Spotlight: GozNym

By Talos Group This blog was authored by Ben Baker, Edmund Brumaghin, and Jonah Samost. Executive Summary GozNym is the combination of features from two previously identified families of malware, Gozi and Nymaim. Gozi was a widely distributed banking trojan with a known Domain Generation Algorithm (DGA) and also contained the ability to install a Master Boot Record […]

Source:: Cisco Security Notice

Project APT: How to Build an ICS Network and Have fun at the Same Time

By Talos Group The Industrial Control System (ICS) security team at Talos frequently see requests from peers and from students on how to build an ICS test lab. After all, the best way to learn is to get some equipment and learn with good old-fashioned hands-on tinkering. Unfortunately, many frame their test lab inquiries based on more traditional […]

Source:: Cisco Security Notice

Project APT: How to Build an ICS Network and Have fun at the Same Time

By Talos Group The Industrial Control System (ICS) security team at Talos frequently see requests from peers and from students on how to build an ICS test lab. After all, the best way to learn is to get some equipment and learn with good old-fashioned hands-on tinkering. Unfortunately, many frame their test lab inquiries based on more traditional […]

Source:: Cisco Security Notice