Blog Posts Tagged with "Cisco"

54a9b7b662bfb0f0445d1661d7ed180b

Beware of the Imitations

September 16, 2015 Added by:Jayson Wylie

There have been reports of compromised Cisco IOS files being run in the wild. There have also been warnings about reversed engineered IOS images been detected.

Comments  (0)

E376ca757c1ebdfbca96615bf71247bb

Network Surveillance Devices Discovered via Shodan

September 20, 2012 Added by:shawn merdinger

It’s no secret that Shodan has turned up some interesting findings over the years. Now, we can add surveillance devices like BlueCoat Proxy and PacketShaper boxes, Cisco routers running Lawful Intercept code and various vendors’ CALEA Mediation Devices to what savvy researchers can find...

Comments  (1)

94ae16c30d35ee7345f3235dfb11113c

Big Boy Politics: Rep. Frank Wolf Demonstrates

May 09, 2012 Added by:Joel Harding

Congressman Wolf, why don’t you establish a program, for the sake of national security, inspecting equipment originating from outside the US, looking for embedded malicious code and backdoors as well as inspecting software updates for that equipment for the same?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cisco Releases Multiple Security Advisories

March 15, 2012 Added by:Headlines

The Cisco AnyConnect ActiveX control contains a buffer overflow vulnerability which can allow a remote attacker to convince a user to view a specially crafted HTML document, and the attacker may be able to then execute arbitrary code...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Cisco Released Multiple Security Advisories

March 02, 2012 Added by:Infosec Island Admin

Cisco has released six security advisories this week to address vulnerabilities that may allow an attacker to execute arbitrary code, cause a denial-of-service condition, operate with escalated privileges and bypass security restrictions...

Comments  (0)

Bc353c4c6a6f7743290ce11723414424

ASA and IPS Parallel Features – Part III

July 25, 2011 Added by:Dawn Hopper

One scenario in which asymmetric routing of packets is frequently seen is with topologies designed for load balancing. The unintended consequence of this behavior would be connectivity problems due to dropped packets not matching the device state table...

Comments  (0)

Bc353c4c6a6f7743290ce11723414424

ASA and IPS Parallel Features – Part II

July 19, 2011 Added by:Dawn Hopper

The value of the normalizer with inline mode cannot be overstated; it can reassemble entire fragmented streams as well as modify packets with illegal and/or malformed options before they reach their target. Not surprisingly, some technical documents refer to this function as packet scrubbing...

Comments  (0)

Bc353c4c6a6f7743290ce11723414424

ASA and IPS Parallel Features – Part I

July 07, 2011 Added by:Dawn Hopper

This first part of a two-part series will deal with Application Inspection and Control, sometimes referred to as DPI or Deep Packet Inspection. Rather than give detailed commands, this will serve as a high-level comparison...

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Using the Shun Command on the PIX/ASA

May 18, 2011 Added by:Global Knowledge

One command that had a fairly long history first with the PIX Firewall and now the ASA is the shun command. In this post we’ll examine this command’s history, why it’s useful, and its new-found resurgence in threat detection implementation...

Comments  (1)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

The History Behind EIGRP

April 22, 2011 Added by:Global Knowledge

IGRP scales better than RIP, as internetworks continued to grow in size a D-V protocol such as IGRP required excessive amounts of router CPU power and link bandwidth to support periodic advertisements. To overcome these limitations, EIGRP was developed...

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Introduction to Security Troubleshooting

April 15, 2011 Added by:Global Knowledge

In diagnosing connection and VPN problems, too often SSL or IPSec VPN client logs don’t provide enough information on why connections fail. Consequently, the receiver frequently provides the detail needed through selective debugging and logging...

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

Research Roundup: Cisco’s Annual Report 2010

March 08, 2011 Added by:Mike Meikle

Social Engineering or Trust Exploitation is most effective tool for cyber-criminals. Whether it is through Facebook, Twitter, LinkedIn or via an infected URL, Social Engineering is the key vector in gaining access to privileged information...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cisco WebEx Conferencing Security Vulnerabilities

February 01, 2011 Added by:Headlines

The first vulnerability leaves the end-user's computer open to remote execution of commands by an attacker. The second vulnerability causes meeting attendee's computers to crash if a minor alteration is made to the XML code in a file that controls the WebEx polling feature...

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

Global GovCloud and the Virtual Environment

January 27, 2011 Added by:Kevin L. Jackson

Recently I had the awesome experience of participating in a global tele-presence conference on government cloud computing. A key takeaway for me was that pre-integrated cloud infrastructure solutions have been credited with reducing the non-recurring engineering cost of private clouds...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Ten Security Events of 2010

December 27, 2010 Added by:Headlines

2010 has proved to be a most eventful year for the information security field. From the WikiLeaks "Cablegate" disclosures to Chinese state-sponsored hacking, the Stuxnet virus to Google's WIFI intrusions, 2010 will certainly be remembered as a benchmark year.

Comments  (0)

69dafe8b58066478aea48f3d0f384820

New Metasploit 3.5.1 Release Includes Cisco Exploits

December 18, 2010 Added by:Headlines

The recent Metasploit 3.5.1 release offers users a wider range of tools, with 47 new modules and 8 new scripts, and now includes options to perform exploits on Cisco products. The latest version of Metasploit has a total of 635 exploits, 314 auxiliary modules, and 215 payloads available...

Comments  (0)

Page « < 1 - 2 > »