Malware Meets SysAdmin – Automation Tools Gone Bad

This post was authored by  Alex Chiu and Xabier Ugarte Pedrero . Talos recently spotted a targeted ...

Aug 25th | Cisco Blog » Security

Microsoft Internet Explorer Out of Band Advisory

Today an out of band advisory was released by Microsoft to address CVE-2015-2502 . This vulnerabilit...

Aug 18th | Cisco Blog » Security

A Global Cybergovernance Framework: The Real Infrastructure Needed to Support a More Secure Internet

As part of a broader “Cybersecurity Call to Action” outlined in the Cisco 2015 Midyear Security ...

Aug 14th | Cisco Blog » Security

Talos Identifies Multiple Memory Corruption Issues in Quicktime

Update 2015-08-21: This post has been updated to reflect an additional advisory released on August ...

Aug 13th | Cisco Blog » Security

Enabling Retail Business Innovation With Threat-Centric Security

Last year was one of the biggest years for retail data breaches, with credit card data from well ove...

Aug 13th | Cisco Blog » Security

Microsoft Patch Tuesday – August 2015

Microsoft has released their monthly set of security bulletins designed to address security vulnerab...

Aug 11th | Cisco Blog » Security

Threat Vectors for Criminals: Common Coding Errors and Open-Source Vulnerabilities

Coding errors in software products provide easy paths of entry for online criminals, who can exploit...

Aug 10th | Cisco Blog » Security

Research Spotlight: Detecting Algorithmically Generated Domains

This post was authored by Mahdi Namazifar and Yuxi Pan Once a piece of malware has been successfully...

Aug 8th | Cisco Blog » Security

See More Disclaimer

Social comments capture authentic, public statements made by users about the Cisco brand on Twitter. The displayed comments are representative of any Twitter user, which may include Cisco employee personal accounts. If you wish to remove your publicly available comment from this webpage, please send a direct message to @CiscoSocial from your respective Twitter account.