FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ Security – Cisco Blog

Stopping Supply Chain Attacks with Cisco’s User Protection Suite

By: Jennifer Golden β€” June 28th 2024 at 12:00
Learn about how Cisco’s User Protection Suite can stop supply chain attacks and protect users.
☐ β˜† βœ‡ Security – Cisco Blog

Exciting News: CDO India and CDO Australia Now Generally Available!

By: Vignesh Sathiamoorthy β€” June 24th 2024 at 12:00
Cisco Defense Orchestrator (CDO) is now generally available in India and Australia. This expansion brings robust security management closer to our customers in these regions, ensuring enhanced performance and local compliance.
☐ β˜† βœ‡ Security – Cisco Blog

Security Cloud Control: Pioneering the Future of Security Management

By: Vignesh Sathiamoorthy β€” June 21st 2024 at 12:00
Cisco Security Cloud Control with AIOps offers a game-changing way to enhance operational efficiency and bolster security. By incorporating AIOps into our services, we are adopting a more intelligent and proactive methodology to safeguard and optimize the performance and security of your network infrastructure.
☐ β˜† βœ‡ Security – Cisco Blog

Up your Quality of Life with Secure MSP Hub and Secure MSP Center

By: Anjana Kambhampati β€” June 20th 2024 at 12:00
All the MSP technology around us is meant to increase our productivity through tools and automation so that our quality of life can be improved. The reality can be different
☐ β˜† βœ‡ Security – Cisco Blog

How to Monitor Network Traffic: Findings from the Cisco Cyber Threat Trends Report

By: Ben Nahorney β€” June 18th 2024 at 12:00
The Cisco Cyber Threat Trends report examines malicious domains for trends and patterns. See what the data tells us about the threat landscape.
☐ β˜† βœ‡ Security – Cisco Blog

Stay Compliant: Cisco Secure Workload Introduces State-of-the-art, Persona-based Reporting

By: Jyotsna Venkatesh β€” June 17th 2024 at 12:00
Traditional workload security tools often fail to provide metrics tailored to the distinct needs of SecOps, Network Administrators, or CxOs.
☐ β˜† βœ‡ Security – Cisco Blog

Bolster SaaS Security Posture Management with Zero Trust Architecture

By: Tom Baumgartner β€” June 13th 2024 at 12:00
Cisco and AppOmni have teamed to extend zero trust principles to secure SaaS applications and data with a closed loop zero trust architecture.
☐ β˜† βœ‡ Security – Cisco Blog

Operationalizing our custom β€œSOC in a Box” at the RSA Conference 2024

By: Aditya Sankar β€” June 13th 2024 at 12:00
Cisco engineers often face the challenge of setting up a Security Operations Center in two days at global events. Aditya Sankar explains the process with our β€œSOC in a Box” in this blog.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco ISE 3.4 begins June with a bang

By: Ramit Kanda β€” June 12th 2024 at 12:00
Learn more about Cisco ISE 3.4 announcement and Common Policy.
☐ β˜† βœ‡ Security – Cisco Blog

Forrester Names Cisco a Leader in OT Security

By: Vikas Butaney β€” June 11th 2024 at 08:00
Securing industrial networks is top of mind. Cisco’s comprehensive OT security solution and unified IT/OT security platform is a Leader according to Forrester. Learn what makes Cisco stand apart in this market.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Simplifies Cloud Security with AWS Cloud WAN Service Insertion

By: Murali Rathinasamy β€” June 11th 2024 at 16:00
Learn how Cisco cloud security integrates with AWS Cloud WAN
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Builds on the CNAPP Movement to Secure and Protect the Cloud Native Application Estate

By: Kate MacLean β€” June 10th 2024 at 12:00
Enterprise Strategy Group Report Identifies Crucial Requirements for Scalable Security, Multicloud Visibility, and True β€œShift Left” DevSecOps
☐ β˜† βœ‡ Security – Cisco Blog

Security, the cloud, and AI: building powerful outcomes while simplifying your experience

By: Rick Miles β€” June 7th 2024 at 12:00
Read how Cisco Security Cloud Control prioritizes consolidation of tools and simplification of security policy without compromising your defense.
☐ β˜† βœ‡ Security – Cisco Blog

Securing Meraki Networks with Cisco XDR

By: Rajat Gulati β€” June 6th 2024 at 12:00
Discover how the Cisco XDR and Meraki MX integration provides advanced threat detection and network insights. Join us at Cisco Live 2024 for a demo.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Security at Cisco Live 2024: Innovating at Scale

By: Jeetu Patel β€” June 4th 2024 at 15:06
No matter how reliable and performant your network is, it doesn’t matter if it’s not secure. To help make the world a safer place, we need to reimagine security.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Enhances Zero Trust Access with Google

By: Jeff Scheaffer β€” June 4th 2024 at 15:00
Cisco and Google are collaborating to help organizations block threats and secure access across internet destinations and private applications.
☐ β˜† βœ‡ Security – Cisco Blog

XDR means so much more than some may realize

By: Crystal Storar β€” June 3rd 2024 at 12:00
Discover how Cisco XDR redefines security with integrated tools, AI-driven threat detection, and rapid response to solve real-world problems for the SOC
☐ β˜† βœ‡ Security – Cisco Blog

Managing Firewall complexity and Augmenting Effectiveness with AIOps for Cisco Firewall

By: Gayathri Nagarajan β€” May 30th 2024 at 12:00
Explore how AIOps revolutionizes Cisco Firewall management, enhancing security, reducing downtime, and maximizing ROI with intelligent, automated solutions.
☐ β˜† βœ‡ Security – Cisco Blog

Navigating DORA (Digital Operational Resilience Act) with Secure Workload

By: Jorge Quintero β€” May 28th 2024 at 12:00
The Digital Operational Resilience Act (DORA) represents a shift toward establishing harmonized guidelines that can keep pace with the dynamic nature of cyber threats.
☐ β˜† βœ‡ Security – Cisco Blog

Strengthen Your Security Operations: MITRE ATT&CK Mapping in Cisco XDR

By: Nirav Shah β€” May 20th 2024 at 12:00
Discover how Cisco XDR's MITRE ATT&CK mapping strengthens your security operations. Learn to identify security gaps and improve your cybersecurity posture.
☐ β˜† βœ‡ Security – Cisco Blog

Accessing Secure Client Cloud Management after the SecureX EoL

By: Pete Davis β€” May 17th 2024 at 12:00
Secure Client Management capabilities aren’t going away with the SecureX EOL, the functionality is simply migrating to the Cisco Security Cloud Control service.
☐ β˜† βœ‡ Security – Cisco Blog

Email Security Reinvented: How AI is Revolutionizing Digital Defense

By: Sergio Pinto β€” May 16th 2024 at 12:00
Explore the many ways that Secure Email Threat Defense leverages sophisticated AI and ML to protect against advanced threats.
☐ β˜† βœ‡ Security – Cisco Blog

Black Hat Asia 2024 NOC: Cisco Security Cloud

By: Jessica Bair β€” May 15th 2024 at 12:00
Protecting Black Hat Asia NOC with Cisco Security Cloud
☐ β˜† βœ‡ Security – Cisco Blog

Secure Firewall & Multicloud Defense: Secure Connectivity With Simplified Policy Across Clouds

By: Christopher Consolo β€” May 8th 2024 at 15:00
Learn how Cisco is bringing on-prem and cloud security together into a unified platform to marry the power of Cisco Secure Firewall and Multicloud Defense.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Hypershield – Our Vision to Combat Unknown Vulnerabilities

By: Craig Connors β€” May 6th 2024 at 11:55
Cisco Hypershield can help protect organizations agains unknown vulnerabilities by detecting and blocking unknown vulnerabilities in runtime workloads.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco & Splunk: A Complete SOC Platform Purpose-Built for the AI-Driven Future

By: AJ Shipley β€” May 6th 2024 at 11:55
We're excited about the integration of Cisco XDR and Splunk Enterprise Security, creating a SecOps platform that can grow with customers as needs change.
☐ β˜† βœ‡ The Hacker News

State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage

By: Newsroom β€” April 25th 2024 at 05:50
A new malware campaign leveraged two zero-day flaws in Cisco networking gear to deliver custom malware and facilitate covert data collection on target environments. Cisco Talos, which dubbed the activity ArcaneDoor, attributed it as the handiwork of a previously undocumented sophisticated state-sponsored actor it tracks under the name UAT4356 (aka Storm-1849 by Microsoft). "UAT4356
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Hypershield: A New Era of Distributed, AI-Native Security

By: Tom Gillis β€” April 18th 2024 at 06:55
Cisco Hypershield is a distributed, AI-native system that puts security in every software component of every app on your network, on every server, and in your public and private clouds.
☐ β˜† βœ‡ Security – Cisco Blog

Cisco Hypershield: Reimagining Security

By: Craig Connors β€” April 18th 2024 at 06:55
Cisco Hypershield is a new security infrastructure β€” a fabric β€” that can autonomously create defenses and produce measured responses to detected attacks, making security defenders' jobs easier.
☐ β˜† βœ‡ Security – Cisco Blog

Supercharging Cisco XDR with AI and Identity Intelligence at RSAC 2024

By: Teresa Brunner β€” April 17th 2024 at 12:00

Cisco XDR is a leader in providing comprehensive threat detection and response across the entire attack surface. We’ll be showcasing new capabilities that will give security teams even more insight, a… Read more on Cisco Blogs

☐ β˜† βœ‡ The Hacker News

Cisco Warns of Global Surge in Brute-Force Attacks Targeting VPN and SSH Services

By: Newsroom β€” April 17th 2024 at 08:38
Cisco is warning about a global surge in brute-force attacks targeting various devices, including Virtual Private Network (VPN) services, web application authentication interfaces, and SSH services, since at least March 18, 2024. "These attacks all appear to be originating from TOR exit nodes and a range of other anonymizing tunnels and proxies," Cisco Talos said. Successful attacks could
☐ β˜† βœ‡ Security – Cisco Blog

Synergizing Advanced Identity Threat Detection & Response Solutions

By: Jeff Yeo β€” April 16th 2024 at 12:00

In an ever-evolving digital landscape, cybersecurity has become the cornerstone of organizational success. With the proliferation of sophisticated cyber threats, businesses must adopt a multi-layered… Read more on Cisco Blogs

☐ β˜† βœ‡ Security – Cisco Blog

Cisco Telemetry Broker (CTB) 2.1 Launch

By: Rob Ayoub β€” April 15th 2024 at 12:00

The ability to generate NetFlow from devices that do not natively produce it along with significant storage efficiency and improved workflows make for a significant update to CTB.

Cisco Telemetry… Read more on Cisco Blogs

☐ β˜† βœ‡ Security – Cisco Blog

Cisco Secure Access Wins Global Security Service Edge Customer Value Leadership Award

By: David Gormley β€” April 11th 2024 at 12:00

It’s one thing to claim leadership in cloud security; it’s another to have that leadership acknowledged by industry experts. That’s why we’re thrilled to announce our recent recognition by Frost & Sul… Read more on Cisco Blogs

☐ β˜† βœ‡ Security – Cisco Blog

Defusing the threat of compromised credentials

By: Ben Nahorney β€” April 9th 2024 at 12:00

Let’s say that, during the middle of a busy day, you receive what looks like a work-related email with a QR code. The email claims to come from a coworker, requesting your help in reviewing a d… Read more on Cisco Blogs

☐ β˜† βœ‡ Security – Cisco Blog

Introducing Cisco XDR Playbooks: Finding the balance in automating and guiding incident response

By: Rob Gresham β€” March 22nd 2024 at 12:00

Security Operations is the beating heart of any organization, a united team vigilantly standing guard against cyber threats. To outsmart their adversaries, they must delve deep into the intricate… Read more on Cisco Blogs

☐ β˜† βœ‡ The Hacker News

Russia Hackers Using TinyTurla-NG to Breach European NGO's Systems

By: Newsroom β€” March 21st 2024 at 16:03
The Russia-linked threat actor known as Turla infected several systems belonging to an unnamed European non-governmental organization (NGO) in order to deploy a backdoor called TinyTurla-NG (TTNG). "The attackers compromised the first system, established persistence and added exclusions to antivirus products running on these endpoints as part of their preliminary post-compromise actions," Cisco
☐ β˜† βœ‡ Security – Cisco Blog

Cisco and Nvidia: Redefining Workload Security

By: Jana Radhakrishnan β€” March 20th 2024 at 12:00

There has been an exponential increase in breaches within enterprises despite the carefully constructed and controlled perimeters that exist around applications and data. Once an attacker can access… Read more on Cisco Blogs

☐ β˜† βœ‡ Security – Cisco Blog

Cisco Secure Access named Leader in Zero Trust Network Access

By: Andrew Akers β€” March 19th 2024 at 12:00

Zero Trust Network Access (ZTNA) is a critical component to increase productivity and reduce risk in today’s hyper-distributed environments. Cisco Secure Access provides a modern form of zero trust a… Read more on Cisco Blogs

☐ β˜† βœ‡ The Hacker News

Hackers Exploiting Popular Document Publishing Sites for Phishing Attacks

By: Newsroom β€” March 19th 2024 at 10:32
Threat actors are leveraging digital document publishing (DDP) sites hosted on platforms like FlipSnack, Issuu, Marq, Publuu, RelayTo, and Simplebooklet for carrying out phishing, credential harvesting, and session token theft, once again underscoring how threat actors are repurposing legitimate services for malicious ends. "Hosting phishing lures on DDP sites increases the likelihood
☐ β˜† βœ‡ Security – Cisco Blog

Complexity drives more than security risk. Secure Access can help with that too.

By: Andrew Akers β€” March 14th 2024 at 12:00

Modern networks are complex, often involving hybrid work models and a mix of first- and third-party applications and infrastructure. In response, organizations have adopted security service edge… Read more on Cisco Blogs

☐ β˜† βœ‡ Security – Cisco Blog

Mitigating Lateral Movement with Zero Trust Access

By: Andrew Akers β€” March 5th 2024 at 13:00

Security service edge (SSE) technology was created to protect remote and branch users with a unified, cloud-delivered security stack. To understand how SSE solutions protect organizations and their… Read more on Cisco Blogs

☐ β˜† βœ‡ The Hacker News

TimbreStealer Malware Spreading via Tax-themed Phishing Scam Targets IT Users

By: Newsroom β€” February 28th 2024 at 07:43
Mexican users have been targeted with tax-themed phishing lures at least since November 2023 to distribute a previously undocumented Windows malware called TimbreStealer. Cisco Talos, which discovered the activity, described the authors as skilled and that the "threat actor has previously used similar tactics, techniques and procedures (TTPs) to distribute a banking trojan known
☐ β˜† βœ‡ Security – Cisco Blog

Benefits of Ingesting Data from Amazon Inspector into Cisco Vulnerability Management

By: Ahmadreza Edalat β€” February 27th 2024 at 13:00

Co-authored by Tejas Sheth, Sr. Security Specialist, Amazon Web Services – AISPL.

Risk-based Vulnerability Management (RBVM) represents a strategic approach to cyber security that focuses on… Read more on Cisco Blogs

☐ β˜† βœ‡ Security – Cisco Blog

Drive Your Cybersecurity Platform Transformation: Lead the Way With SSE

By: Bill Mabon β€” February 26th 2024 at 13:00

By shifting from point-solutions to a cybersecurity platform approach, IT and security teams significantly improve their efficiency and security outcomes. Security Service Edge (SSE) projects are… Read more on Cisco Blogs

☐ β˜† βœ‡ Security – Cisco Blog

Cisco Secure Access Accelerates SSE Innovation with AI, User Experience Monitoring, and Identity Intelligence

By: Jeff Scheaffer β€” February 19th 2024 at 13:00

In a blog post last December, I said that the business and IT leaders with whom I meet always ask: How can I secure my highly distributed workforce, who gets more varied and decentralized all the… Read more on Cisco Blogs

☐ β˜† βœ‡ Security – Cisco Blog

NIS2 compliance for industrial networks: Are you ready?

By: Fabien Maisl β€” February 16th 2024 at 17:47

Since the European Union (EU) signed the second version of the Network and Information Security (NIS2) Directive in December 2022, there has been a real frenzy all around Europe about it. NIS2 is now… Read more on Cisco Blogs

☐ β˜† βœ‡ The Hacker News

CISA Warning: Akira Ransomware Exploiting Cisco ASA/FTD Vulnerability

By: Newsroom β€” February 16th 2024 at 15:42
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched security flaw impacting Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software to its Known Exploited Vulnerabilities (KEV) catalog, following reports that it's being likely exploited in Akira ransomware attacks. The vulnerability in question is CVE-2020-
☐ β˜† βœ‡ The Hacker News

Stealthy Zardoor Backdoor Targets Saudi Islamic Charity Organization

By: Newsroom β€” February 9th 2024 at 06:31
An unnamed Islamic non-profit organization in Saudi Arabia has been targeted as part of a stealthy cyber espionage campaign designed to drop a previously undocumented backdoor called Zardoor. Cisco Talos, which discovered the activity in May 2023, said the campaign has likely persisted since at least March 2021, adding it has identified only one compromised target to date, although it's
☐ β˜† βœ‡ The Hacker News

Critical Cisco Flaw Lets Hackers Remotely Take Over Unified Comms Systems

By: Newsroom β€” January 26th 2024 at 05:13
Cisco has released patches to address a critical security flaw impacting Unified Communications and Contact Center Solutions products that could permit an unauthenticated, remote attacker to execute arbitrary code on an affected device. Tracked as CVE-2024-20253 (CVSS score: 9.9), the issue stems from improper processing of user-provided data that a threat actor could abuse to send a
☐ β˜† βœ‡ The Hacker News

Cisco Fixes High-Risk Vulnerability Impacting Unity Connection Software

By: Newsroom β€” January 11th 2024 at 04:55
Cisco has released software updates to address a critical security flaw impacting Unity Connection that could permit an adversary to execute arbitrary commands on the underlying system. Tracked as CVE-2024-20272 (CVSS score: 7.3), the vulnerability is an arbitrary file upload bug residing in the web-based management interface and is the result of a lack of authentication in a specific
☐ β˜† βœ‡ The Hacker News

8Base Group Deploying New Phobos Ransomware Variant via SmokeLoader

By: Newsroom β€” November 18th 2023 at 11:27
The threat actors behind theΒ 8Base ransomwareΒ are leveraging a variant of the Phobos ransomware to conduct their financially motivated attacks. The findings come from Cisco Talos, which has recorded an increase in activity carried out by the cybercriminals. β€œMost of the group’s Phobos variants are distributed by SmokeLoader, a backdoor trojan," security researcher Guilherme Venere said in an
☐ β˜† βœ‡ The Hacker News

Backdoor Implanted on Hacked Cisco Devices Modified to Evade Detection

By: Newsroom β€” October 24th 2023 at 06:33
The backdoor implanted on Cisco devices by exploiting a pair of zero-day flaws in IOS XE software has been modified by the threat actor so as to escape visibility via previous fingerprinting methods. "Investigated network traffic to a compromised device has shown that the threat actor has upgraded the implant to do an extra header check," NCC Group's Fox-IT teamΒ said. "Thus, for a lot of devices
❌