Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 2 / 2
32 résultats taggé Cisco  ✕
Cisco: Hacker breached multifactor authentication message provider on April 1 https://therecord.media/cisco-duo-data-breach-mfa-telephony-provider?_hsenc=p2ANqtz-9wele4oTF0tDrlbVagSSLRHrkFVta-UiNnzNSZJ5tq6X9qHse_aGaXTU1xX_tC1ttQebQSUZbMCYg3kqq1TxhkgpIrFg&_hsmi=303475837
20/04/2024 09:34:13
QRCode
archive.org
thumbnail

Cisco said one of the providers it uses to send multifactor authentication (MFA) messages was breached by a threat actor on April 1.

In emails to customers, Cisco said the incident specifically affected Duo — a multifactor authentication company it acquired in 2018. The attacker breached the system of a telephony supplier that Duo uses to send MFA messages through texts and phone calls to its customers.

therecord EN 2024 Cisco breached multifactor authentication duo
Volt Typhoon Compromises 30% of Cisco RV320/325 Devices in 37 Days https://securityscorecard.com/blog/threat-intelligence-research-volt-typhoon/
15/01/2024 11:22:34
QRCode
archive.org
thumbnail

SecurityScorecard has discovered the threat actor group Volt Typhoon has compromised 30% of Cisco RV320/325 Devices in 37 Days. Learn more.

securityscorecard EN 2024 VoltTyphoon Cisco RV320/325 research compromised
Cisco discloses new IOS XE zero-day exploited to deploy malware implant https://www.bleepingcomputer.com/news/security/cisco-discloses-new-ios-xe-zero-day-exploited-to-deploy-malware-implant/
21/10/2023 12:50:53
QRCode
archive.org
thumbnail

Cisco disclosed a new high-severity zero-day (CVE-2023-20273) today, actively exploited to deploy malicious implants on IOS XE devices compromised using the CVE-2023-20198 zero-day unveiled earlier this week.

bleepingcomputer EN 2023 Cisco IOS-XE Zero-Day CVE-2023-20273
Active exploitation of Cisco IOS XE Software Web Management User Interface vulnerability https://blog.talosintelligence.com/active-exploitation-of-cisco-ios-xe-software/
17/10/2023 19:57:30
QRCode
archive.org
thumbnail

Cisco has identified active exploitation of a previously unknown vulnerability in the Web User Interface (Web UI) feature of Cisco IOS XE software (CVE-2023-20198) when exposed to the internet or untrusted networks.

talosintelligence EN 2023 Cisco IOS XE Web Management CVE-2023-20198
Cisco urges admins to fix IOS software zero-day exploited in attacks https://www.bleepingcomputer.com/news/security/cisco-urges-admins-to-fix-ios-software-zero-day-exploited-in-attacks/
02/10/2023 13:09:51
QRCode
archive.org
thumbnail

Cisco warned customers on Wednesday to patch a zero-day IOS and IOS XE software vulnerability targeted by attackers in the wild.

bleepingcomputer Cisco Warning Zero-Day Security InfoSec Computer-Security CVE-2023-20109
Dump these Cisco phone adapters because it's not fixing them https://www.theregister.com/2023/05/05/cisco_phone_adapter_vulnerabilitty/
08/05/2023 07:16:38
QRCode
archive.org
thumbnail

There is a critical security flaw in a Cisco phone adapter, and the business technology giant says the only step to take is dumping the hardware and migrating to new kit.

In an advisory, Cisco this week warned about the vulnerability in the SPA112 2-Port Adapter that, if exploited, could allow a remote attacker to essentially take control of a compromised device by seizing full privileges and executing arbitrary code.

The flaw, tracked as CVE-2023-20126, is rated as "critical," with a base score o

theregister EN 2023 Cisco CVE-2023-20126 SPA112 2-Port phone adaptor
Cisco warns of critical flaw in ClamAV antivirus https://www.theregister.com/2023/02/17/cisco_clamav_critical_flaw/
17/02/2023 08:34:38
QRCode
archive.org
thumbnail

Switchzilla hardware and software need attention, unless you fancy arbitrary remote code execution

theregister EN 2023 cisco ClamAV critical antivirus RCE patch
Cisco discloses high-severity IP phone zero-day with exploit code https://www.bleepingcomputer.com/news/security/cisco-discloses-high-severity-ip-phone-zero-day-with-exploit-code/
12/12/2022 15:48:05
QRCode
archive.org
thumbnail

Cisco has disclosed today a high-severity zero-day vulnerability affecting the latest generation of its IP phones and exposing them to remote code execution and denial of service (DoS) attacks.

bleepingcomputer EN 2022 Cisco Denial-of-Service DoS RCE Remote-Code-Execution Zero-Day CVE-2022-20968
Cisco confirms May attack by Yanluowang ransomware group https://therecord.media/cisco-confirms-may-attack-by-yanluowang-ransomware-group/
14/08/2022 21:40:33
QRCode
archive.org
thumbnail

Cisco confirmed on Wednesday that it was attack by the Yanluowang ransomware group in May, but said the hackers were not able to steal sensitive data or impact the company’s operations.

In a statement to The Record, Cisco said the incident occured on their corporate network in late May and that they “immediately took action to contain and eradicate the bad actors.”

therecord EN 2022 Yanluowang Cisco talos phishing voicemail
Comprehensive Threat Intelligence: Cisco Talos shares insights related to recent cyber attack on Cisco https://blog.talosintelligence.com/2022/08/recent-cyber-attack.html?m=1
11/08/2022 20:22:21
QRCode
archive.org
thumbnail
  • On May 24, 2022, Cisco became aware of a potential compromise. Since that point, Cisco Security Incident Response (CSIRT) and Cisco Talos have been working to remediate.
  • During the investigation, it was determined that a Cisco employee’s credentials were compromised after an attacker gained control of a personal Google account where credentials saved in the victim’s browser were being synchronized.
talosintelligence EN 2022 Cisco attack Google sync password insights
CVE-2020-3433 : élévation de privilèges sur le client VPN Cisco AnyConnect https://connect.ed-diamond.com/MISC/misc-112/cve-2020-3433-elevation-de-privileges-sur-le-client-vpn-cisco-anyconnect
19/07/2022 11:33:56
QRCode
archive.org

Cet article explique comment trois vulnérabilités supplémentaires ont été découvertes dans le client VPN Cisco AnyConnect pour Windows. Elles ont été trouvées suite au développement d’un exploit pour la CVE-2020-3153 (une élévation de privilèges, étudiée dans MISC n°111). Après un rappel du fonctionnement de ce logiciel, nous étudierons chacune de ces nouvelles vulnérabilités.

ed-diamond FR 2020 CVE-2020-3433 Cisco AnyConnect analysis
New Flaws Discovered in Cisco's Network Operating System for Switches https://thehackernews.com/2022/02/new-flaws-discovered-in-ciscos-network.html
26/02/2022 11:17:14
QRCode
archive.org
Cisco thehackernews En 2022 NX-OS Nessus CVE-2022-20650 CVE-2022-20624 CVE-2022-20623
page 2 / 2
4304 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio