Security
Headlines
HeadlinesLatestCVEs

Tag

#cisco

Why Browser Vulnerabilities Are a Serious Threat — and How to Minimize Your Risk

As a result of browser market consolidation, adversaries can focus on uncovering vulnerabilities in just two main browser engines.

DARKReading
#vulnerability#web#mac#windows#apple#google#microsoft#cisco#java#rce#auth#zero_day#chrome#firefox
Researcher Spotlight: Around the security world and back again with Nick Biasini

By Jon Munshaw.  Nick Biasini’s seen it all.   Going on a nearly 20-year security career, he’s been a part of some of Cisco Talos’ largest undertakings in the company’s history. From an attack on the global Olympic Games, to a wireless router malware that affected hundreds of... [[ This is only the beginning! Please visit the blog for the complete entry ]]

Researcher Spotlight: Around the security world and back again with Nick Biasini

By Jon Munshaw.  Nick Biasini’s seen it all.   Going on a nearly 20-year security career, he’s been a part of some of Cisco Talos’ largest undertakings in the company’s history. From an attack on the global Olympic Games, to a wireless router malware that affected hundreds of... [[ This is only the beginning! Please visit the blog for the complete entry ]]

End-to-End Encryption's Central Role in Modern Self-Defense

With abortion set to be criminalized in more than half the US, encryption has never been more important for protection—and civil disobedience.

Researchers Share Techniques to Uncover Anonymized Ransomware Sites on Dark Web

Cybersecurity researchers have detailed the various measures ransomware actors have taken to obscure their true identity online as well as the hosting location of their web server infrastructure. "Most ransomware operators use hosting providers outside their country of origin (such as Sweden, Germany, and Singapore) to host their ransomware operations sites," Cisco Talos researcher Paul Eubanks

HackerOne Fires Employee for Stealing Bug Reports, Collecting Bug Bounties

By Deeba Ahmed Bug bounty and vulnerability coordination platform HackerOne has fired an employee for using their position to access customers’… This is a post from HackRead.com Read the original post: HackerOne Fires Employee for Stealing Bug Reports, Collecting Bug Bounties

The Worst Hacks and Breaches of 2022 So Far

From cryptocurrency thefts to intrusions into telecom giants, state-backed attackers have had a field day in the year’s first half.

HackerOne Employee Caught Stealing Vulnerability Reports for Personal Gains

Vulnerability coordination and bug bounty platform HackerOne on Friday disclosed that a former employee at the firm improperly accessed security reports submitted to it for personal gain. "The person anonymously disclosed this vulnerability information outside the HackerOne platform with the goal of claiming additional bounties," it said. "In under 24 hours, we worked quickly to contain the

RSA 2022: Omdia Research Take Aways

The RSA conference in San Francisco always feels like drinking from a fire hose but especially this year at the first in-person RSA since the pandemic began.

CVE-2022-32585: TALOS-2022-1570 || Cisco Talos Intelligence Group

A command execution vulnerability exists in the clish art2 functionality of Robustel R1510 3.3.0. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger this vulnerability.