Defending Against Log4j Exploits with Cisco Secure Endpoint – Cisco Blogs

Defending Against Log4j Exploits with Cisco Secure Endpoint – Cisco Blogs

The Apache Log4j vulnerability (CVE-2021-44228) is on the mind of nearly every cybersecurity and IT team right now because of its widespread usage, ease of exploitation, and broad attack surface. This blog provides an overview of how Cisco Secure Endpoint helps protect your environment from attackers exploiting this vulnerability. What You Need to Know About Log4j On Thursday, December 9, the Apache Software Foundation disclosed a security vulnerability in Apache Log4j, a Java-based logging library…

Read More

Log4J and The Memory That Knew Too Much

Log4J and The Memory That Knew Too Much

By Guilherme Venere, Ismael Valenzuela, Carlos Diaz, Cesar Vargas, Leandro Costantino, Juan Olle, Jose Luis Sanchez Martinez, AC3 Team Collaborators: ATR Team (Steve Povolny, Douglas McKee, Mark Bereza), Frederick House (FireEye), Dileep Kumar Jallepalli (FireEye) In this post we want to show how an endpoint solution with performant memory scanning capabilities can effectively detect active exploitation scenarios and complement network security capabilities your company has implemented. Background As it is becoming the norm lately, a…

Read More

Conti ransomware gang exploits Log4Shell bug in its operations

Conti ransomware gang exploits Log4Shell bug in its operations

The Conti ransomware gang is the first ransomware operation exploiting the Log4Shell vulnerability to target VMware vCenter Servers. Conti ransomware gang is the first professional race that leverages Log4Shell exploit to compromise VMware vCenter Server installs. The ransomware group used the exploit to target internal devices that are not protected. Conti operators run a private Ransomware-as-a-Service (RaaS), the malware appeared in the threat landscape at the end of December 2019 and was distributed through TrickBot infections. Experts speculate…

Read More

Cisco Developer Relations in 2021, and What’s Ahead in 2022

Cisco Developer Relations in 2021, and What’s Ahead in 2022

We are closing out yet another eventful year, one that has seen waves of change in our use of technology, an increased need for automation and virtualization, and new dependencies from users around the world on our global developer community. Yet, beyond innovations that helped us live – literally – through the pandemic, it’s been a year of triumphs, trials, and tidal shifts, notably marked by the continued migration to the cloud and the importance…

Read More

Getting started with Cisco SD-Access and Cisco DNA Center – Cisco Blogs

Getting started with Cisco SD-Access and Cisco DNA Center – Cisco Blogs

We are transitioning to a new era in networking where virtualization, automation, analytics, and security are becoming the key building blocks of the “new” intent-based network. While new technologies and solutions present new opportunities for the network, they are only made possible by the enterprise network teams that possess the knowledge and skills to access their full potential. What enterprise network teams need to know To meet this challenge, engineers and enterprise network teams need…

Read More

Synthetic identity fraud: What is it, and why is it harmful?

Synthetic identity fraud: What is it, and why is it harmful?

Online consumers can do everything right and still become cyber victims. Learn about synthetic identity fraud and why “buyer beware” is not enough. Image: Shutterstock/PabloLagart Digital criminals are creating new and effective ways to con businesses and financial institutions by using synthetic identity fraud. They are having enough success that those in the know at McKinsey and Company are more than a little concerned: “By our estimates, synthetic identity fraud is the fastest-growing type of…

Read More

It’s Time for Networks to Join the Agility Revolution

It’s Time for Networks to Join the Agility Revolution

By: James Robertson, Office of the CTO, at Aruba, a Hewlett Packard Enterprise Company When it comes to the modern business, “Virtualize Everything” and the shift to the cloud has become the default strategy. Ultimately, the journey to cloud has been brought on by the need to control costs, reduce footprints, and simplify technology stacks in order to create the agility and flexibility to move towards consumption-based cost models and away from fixed assets. The pandemic has…

Read More

Disabilities Around Us – Turning Awareness into Action – Cisco Blogs

Disabilities Around Us – Turning Awareness into Action – Cisco Blogs

At Cisco, our purpose is to power an inclusive future for all. I truly believe those words – ‘inclusive’ and ‘for all’ – must underpin everything we do at Cisco. Cisco office in Bedfont Lakes (UK) on December 3rd supporting the PurpleLightUp initiative Over 30,000 of Cisco employees participate in Cisco’s inclusive communities—a group of 29 employee resource organizations (EROs) and employee networks that help our people connect within community and among allies. Our inclusive…

Read More

3 Technology Trends in the Future of Government – Cisco Blogs

3 Technology Trends in the Future of Government – Cisco Blogs

Welcome to the first blog in our #SecureGovernment series! Today, we look at the technological trends that are likely to drive the future of government. In recent times, we’ve seen an unprecedented rate of digital transformation in the public sector. While the government is traditionally built for stability and risk-minimization, agility and rapid adoption were imperative to ensure that critical services were kept up and running. With the lessons learned and building blocks in place,…

Read More

Tesla’s distracted driving raises duty of care questions

Tesla’s distracted driving raises duty of care questions

Tesla’s distracted driving raises duty of care questions | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 3,386 3,387 3,388 3,389 3,390 4,360