Protecting Privacy Build Trust

Protecting Privacy Build Trust
  • Contact Us

CyberSecurity

October 16, 2023 — Active exploitation of Cisco IOS XE Software Web Management User Interface vulnerabilities 

Updates   Nov. 02: Identified a third version of the BadCandy implant. Added expected response from the new version of the implant against one of the HTTP requests used to check for infected device. Nov. 1: Observed increase in exploitation attempts since the publication of the proofs-of-concept (POCs) of the exploits involved. Named the Lua-based web […]

October 16, 2023 — Active exploitation of Cisco IOS XE Software Web Management User Interface vulnerabilities  Read More »

April 24, 2024 — ArcaneDoor – New espionage-focused campaign found targeting perimeter network devices 

*Updated 2024-04-25 16:57 GMT with minor wording corrections regarding the targeting of other vendors. ArcaneDoor is a campaign that is the latest example of state-sponsored actors targeting perimeter network devices from multiple vendors. Coveted by these actors, perimeter network devices are the perfect intrusion point for espionage-focused campaigns. As a critical path for data into

April 24, 2024 — ArcaneDoor – New espionage-focused campaign found targeting perimeter network devices  Read More »

April 16, 2024 — Large-scale brute-force activity targeting VPNs, SSH services with commonly used login credentials 

Cisco Talos would like to acknowledge Anna Bennett and Brandon White of Cisco Talos and Phillip Schafer, Mike Moran, and Becca Lynch of the Duo Security Research team for their research that led to the identification of these attacks. Cisco Talos is actively monitoring a global increase in brute-force attacks against a variety of targets,

April 16, 2024 — Large-scale brute-force activity targeting VPNs, SSH services with commonly used login credentials  Read More »

Security + Privacy = Trust: Respecting Privacy

In today’s interconnected digital landscape, cybersecurity has become paramount in safeguarding sensitive information and protecting against malicious cyber threats. With the proliferation of online transactions, cloud computing, and IoT devices, the need for robust cybersecurity measures has never been more pressing. Cybersecurity encompasses a range of practices, technologies, and policies designed to defend against cyberattacks,

Security + Privacy = Trust: Respecting Privacy Read More »

Security + Privacy = Trust: Respecting Personal Data

Introduction In today’s digital landscape, where personal data is constantly collected and shared, building trust through security and privacy practices is Introduction In today’s digital landscape, where personal data is constantly collected and shared, building trust through security and privacy practices is Introduction In today’s digital landscape, where personal data is constantly collected and shared,

Security + Privacy = Trust: Respecting Personal Data Read More »

Strengthening Cybersecurity: Safeguarding Our Digital World

Introduction In today’s digital landscape, where personal data is constantly collected and shared, building trust through security and privacy practices is Introduction In today’s digital landscape, where personal data is constantly collected and shared, building trust through security and privacy practices is Introduction In today’s digital landscape, where personal data is constantly collected and shared,

Strengthening Cybersecurity: Safeguarding Our Digital World Read More »