Quantcast
Channel: Cisco Blog » TRAC
Browsing all 86 articles
Browse latest View live

Primer on the Common Vulnerability Scoring System CVSS

What is CVSS - (the Common Vulnerability Scoring System)? How can it help me manage risk - and why is it an important step forward in security research? In this short video Gavin Reid CVSS Program...

View Article



Cisco’s Global WSA deployment – Update

This is an update for our original video/blog post (http://blogs.cisco.com/security/cisco-ironport-web-security-appliance-deployment/) on Cisco's CSIRT deployment of the Web Security Appliance.

View Article

CSIRT Monitoring for Cisco House at the London 2012 Olympic Games

As part of CSIRT’s mobile monitoring offering for special events, we undertook monitoring of the corporate and customer traffic of [...]

View Article

Cisco Hosting Amsterdam 2013 FIRST Technical Colloquium

There is still time to register for the upcoming  FIRST Technical Colloquium April 2-3 2013. The event has a very exciting program covering, [...]

View Article

Thoughts on DarkSeoul: Data Sharing and Targeted Attackers

The attacks against South Korean media and banking organizations last week severely disrupted a handful of organizations with a coordinated [...]

View Article


Chronology of a DDoS: SpamHaus

Around 12:00 GMT March 16, 2013, a distributed denial of service (DDoS) attack took offline both the spamhaus.org website and [...]

View Article

Apache Darkleech Compromises

Dan Goodin, editor at Ars Technica, has been  tracking and compiling info on an elusive series of website compromises  that could be impacting tens of thousands of otherwise perfectly legitimate sites....

View Article

Massive Spam and Malware Campaign Following the Boston Tragedy

Summary On April 16th at 11:00pm GMT, the first of two botnets began a massive spam campaign to take advantage [...]

View Article


Yesterday Boston, Today Waco, Tomorrow Malware

At 10:30 UTC one of the botnet spam campaigns we discussed yesterday took a shift to focus on the recent explosion in Texas. The miscreants responded to the tragic events in Texas almost immediately....

View Article


Customized WordPress, Joomla Brute Force Login Attempts

In recent weeks, the occurrence of brute force login attempts targeting WordPress and Joomla installations have significantly increased in volume, [...]

View Article

Possible Exploit Vector for DarkLeech Compromises

Often it is quite surprising how long old, well-known vulnerabilities continue to be exploited. Recently, a friend sent me an example of [...]

View Article

Linux/CDorked FAQs

Last Friday (April 26),  ESET  and  Sucuri  simultaneously blogged about the discovery of  Linux/CDorked , a backdoor impacting Apache servers running cPanel. Since [...]

View Article

Coordinated Attacks Against the U.S. Government and Banking Infrastructure

Prologue On April 10, 2013, a collective of politically motivated  hacktivists  announced a round of planned attacks called  #OPUSA . These attacks, [...]

View Article


STOPhausDDoS: Suspect in Custody

Back in March, Seth Hanford  wrote about a distributed denial of service (DDoS) attack aimed at the SpamHaus organization . Since then, there have been some new developments in the aftermath of the...

View Article

Security Logging in an Enterprise, Part 1 of 2

Logging is probably both one of the most useful and least used of all security forensic capabilities. In large enterprises many security teams rely on their IT counterparts to do the logging and then...

View Article


Department of Labor Watering Hole Attack Confirmed to be 0-Day with Possible...

At the end of April a Watering Hole–style attack was launched from a United States Department of Labor website. Many [...]

View Article

Security Logging in an Enterprise, Part 2 of 2

We first logged IDS, some syslog from some UNIX hosts, and firewall logs (circa 1999). We went from there to dropping firewall logging as it introduced some overhead and we didn’t have any really good...

View Article


Watering Hole Attacks an Attractive Alternative to Spear Phishing

“Watering Hole” attacks, as evidenced by the  recent attack involving the U.S. Department of Labor , are becoming increasingly popular as alternatives to attacks such as Spear Phishing. [...]

View Article

The Effects of #OpUSA

In the days leading up to #OpUSA, security professionals were busy making preparations for the supposed flood of new attacks [...]

View Article

Cisco Sizzle – April Edition

Welcome to the Cisco Sizzle! Each month, we’re rounding up the best of the best from across our social media [...]

View Article
Browsing all 86 articles
Browse latest View live




Latest Images