Cisco

/Tag:Cisco

Week 26 In Review – 2015

Resources The $300 'PITA' steals encryption keys with radio waves - engadget.com Your computer is leaking information. It's not from the usual suspects: WiFi, Bluetooth or ethernet, but from radio waves originating from your processor. Researchers at Tel Aviv University and Israel's Technion research institute have built a $300 device that captures those electromagnetic waves [...]

Week 9 In Review – 2015

Resources BSides Tampa 2015 Videos – irongeek.com These are the videos from the BSides Tampa conference. You can watch and download the videos from here. Gemalto presents the findings of its investigations into the alleged hacking of SIM card encryption keys by Britain's Government Communications Headquarters (GCHQ) and the U.S. National Security Agency (NSA) – gemalto.com The [...]

Week 20 In Review – 2014

Resources Infiltrate 2014 – shadow-file.blogspot.com Here are some additional resources of Zach Cutlip that may have mentioned in his Infiltrate 2014 presentation. BlueHat Security Briefings: Fall 2013 Sessions – channel9.msdn.com The 2013 BlueHat Security Briefings took place on the Microsoft campus in December 2013. Here are the list of talks and discussions. Tools mimikatz 2.0 alpha 20140519 – [...]

Week 17 In Review – 2014

Resources Verizon Data Breach Investigations Report – verizonenterprise.com The 2014 Data Breach Investigations Report (DBIR) casts new light on threats — taking 10 years of forensic data and finding that 92% of these can be categorized into nine basic attack patterns. This approach also helps identify primary threats to your industry, which you can analyze to [...]

Week 30 In Review

Resources Strategies To Mitigate Targeted Cyber Intrusions - dsd.gov.au Australian computer networks are being targeted by adversaries seeking access to sensitive information. A commonly used technique is social engineering, where malicious “spear phishing” emails are tailored to entice the reader to open them. Users may be tempted to open malicious email attachments or follow embedded [...]

Week 25 in Review – 2009

Tools: BackTrack 4 pre-final released Official announcement from Offensive-Security BackTrack 4 Pre Final download link Vulns: HTTP Server DoS A technique to consume all the open HTTP sockets available and keep them open, to create a DoS like environment. But with less packets! Slowloris HTTP DoS – ha.ckers.org Apache HTTP DoS tool released – isc.sans.org [...]

Cisco 2008 Annual Security Report

A few weeks ago, Cisco released their 2008 Annual Security Report. Registration is required to download the presentation. The Cisco Annual Security Report provides an overview of the combined security intelligence of the entire Cisco organization. The report encompasses threat information and trends collected between January and October 2008, and provides a snapshot of the [...]

2008-12-30T22:33:00-07:00 December 30th, 2008|Security Vulnerabilities|0 Comments