Cisco at RSAC 2018: It’s Time to Put Security Above Everything

By Ben Munroe There will be more than 700 vendors on the show floor at RSA Conference. Cool, right? Yes – and no. Competition breeds innovation, which is needed to fight the bad

Source:: Cisco Security Notice

Cisco at RSAC 2018: It’s Time to Put Security Above Everything

By Ben Munroe There will be more than 700 vendors on the show floor at RSA Conference. Cool, right? Yes – and no. Competition breeds innovation, which is needed to fight the bad

Source:: Cisco Security Notice

Vulnerability Spotlight: Moxa AWK-3131A Multiple Features Login Username Parameter OS Command Injection Vulnerability

By Talos Group This vulnerability is discovered by Dave McDaniel of Cisco Talos Today, Talos is disclosing TALOS-2017-0507 (CVE-2017-14459), a vulnerability that has been identified in Moxa AWK-3131A industrial wireless

Source:: Cisco Security Notice

Vulnerability Spotlight: Moxa AWK-3131A Multiple Features Login Username Parameter OS Command Injection Vulnerability

By Talos Group This vulnerability is discovered by Dave McDaniel of Cisco Talos Today, Talos is disclosing TALOS-2017-0507 (CVE-2017-14459), a vulnerability that has been identified in Moxa AWK-3131A industrial wireless

Source:: Cisco Security Notice

Fortinet to Announce First Quarter 2018 Financial Results

Fortinet to Announce First Quarter 2018 Financial Results

Source:: Fortinet

Fortinet to Announce First Quarter 2018 Financial Results

Fortinet to Announce First Quarter 2018 Financial Results

Source:: Fortinet

Fake AV Investigation Unearths KevDroid, New Android Malware

By Talos Group This blog post is authored by Warren Mercer, Paul Rascagneres, Vitor Ventura and with contributions from Jungsoo An. Summary Several days ago, EST Security published a post concerning a fake antivirus

Source:: Cisco Security Notice

Fake AV Investigation Unearths KevDroid, New Android Malware

By Talos Group Talos identified two variants of the Android Remote Administration Tool (RAT) with the capability to steal information on the compromised device (contacts, SMS and phone history) and record phone calls.

Source:: Cisco Security Notice