Tag Cisco

Live Webinar: Innovative Approaches to Combat Insider Threats in Government Organizations

Insider Threats: A Growing Concern in Government Cybersecurity In a recent live webinar hosted by Cisco, experts discussed the increasing threat of insider breaches within federal and state organizations, shedding light on the vulnerabilities posed by legitimate users. With cybercriminals increasingly exploiting valid access, a staggering 66% of breaches arise…

Read MoreLive Webinar: Innovative Approaches to Combat Insider Threats in Government Organizations

Exposing DevOps Vulnerabilities: An Analysis of Over 502 Incidents and 955 Hours of Disruption Across GitHub, GitLab, Atlassian, and Azure DevOps

Over the past year, there have been a staggering 502 security incidents across major platforms, including 48 categorized as high-risk, leading to a combined total of 955 hours of significant and critical interruptions—equivalent to an astonishing 120 business days. These findings come from ‘The DevOps Threats Unwrapped’ report, compiled by…

Read MoreExposing DevOps Vulnerabilities: An Analysis of Over 502 Incidents and 955 Hours of Disruption Across GitHub, GitLab, Atlassian, and Azure DevOps

Ransomware Groups Exploiting Weaknesses in Perimeter Security Appliances

Manufacturers of perimeter security appliances, which encompass devices like CCTV systems, firewalls, radar technologies, and access control solutions, have increasingly overlooked the need to embed strong security features into their products. This oversight leaves these devices vulnerable, contributing to a surge in ransomware incidents. A recent annual threat report published…

Read MoreRansomware Groups Exploiting Weaknesses in Perimeter Security Appliances

U.S. Imposes Sanctions on Iran-Linked Nemesis Administration

Cybercrime, Fraud Management & Cybercrime, Incident & Breach Response Also: BianLian Ransomware Hackers Aren’t Really Mailing You Anviksha More (AnvikshaMore) • March 6, 2025 Image: Shutterstock / ISMG Every week, Information Security Media Group compiles notable cybersecurity incidents and breaches globally. This week, the U.S. imposed sanctions on an Iranian…

Read MoreU.S. Imposes Sanctions on Iran-Linked Nemesis Administration

Claroty, Nozomi, and Armis Lead Cyber-Physical Security Rankings

Gartner’s First-Ever Ranking of Cyber-Physical Security Vendors Highlights a Shift in Market Dynamics In a comprehensive new report by Gartner, the cyber-physical security landscape has been significantly illuminated, spotlighting the leading vendors within this niche sector. Not only have traditional players like Microsoft entered the fray, but dedicated operational technology…

Read MoreClaroty, Nozomi, and Armis Lead Cyber-Physical Security Rankings

No Cisco Zero-Day Vulnerabilities Exploited in Salt Typhon Telecom Hacks

Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime, Network Firewalls, Network Access Control Chinese Hackers Utilize Custom Tool to Capture Network Packets Anviksha More (AnvikshaMore) • February 21, 2025 Image: Shutterstock A recent analysis by Cisco’s Talos unit confirms that Chinese state-sponsored hackers employed a custom-built utility to infiltrate U.S.…

Read MoreNo Cisco Zero-Day Vulnerabilities Exploited in Salt Typhon Telecom Hacks

Salt Typhoon Targets Cisco Devices Within Telecommunications Infrastructure

Title: Salt Typhoon Targets Cisco Devices in Global Cyber Campaign In a significant cybersecurity incident, the advanced persistent threat (APT) group known as Salt Typhoon has compromised over a thousand Cisco devices across a network of telecommunications companies, internet service providers (ISPs), and academic institutions. This widespread attack poses serious…

Read MoreSalt Typhoon Targets Cisco Devices Within Telecommunications Infrastructure