Mobile World Congress 2025 in Barcelona delivered on every promise – a record-breaking event with 109,000 attendees from 205 countries, with over 2,900 exhibitors, sponsors, and partners showcasing an impressive array of cutting‐edge topics, from 5G and IoT to Unified Security for the AI-driven Future. As always, Cisco’s presence showcased a suite of innovations, such as the … [Read more...] about SOC in the Network Operations Center
Network
Network Visibility Module & Zeek Detections in SNA
Secure Network Analytics version 7.5.2 has been released, offering exciting new features such as the Network Visibility Module (NVM) and Zeek detections. We are expanding our detections across existing and new sources, and our detections engine now ingests NVM telemetry and Zeek logs, introducing nine new alerts prominently displayed in Analytics. These alerts are also aligned … [Read more...] about Network Visibility Module & Zeek Detections in SNA
Protecting Android, Windows, and Linux devices against being tracked via the Find My network
AirTags are a popular tracking device used by anyone from forgetful key owners to those with malicious intent, such as jealous spouses and car thieves. Using AirTags for spying is simple: a tag is discreetly placed on the target to allow their movements to be conveniently monitored using Apple Find My. We’ve even added protection from AirTag-based tracking to our products for … [Read more...] about Protecting Android, Windows, and Linux devices against being tracked via the Find My network
CrowdStrike Expands Security to Unmanaged Network Assets
Falcon Customers Can Enable Network Vulnerability Assessment in Minutes If you’re already using the Falcon unified agent, activating Network Vulnerability Assessment takes just minutes — no extra scanners, agents, or hardware required. Within hours, you’ll uncover unmanaged devices, prioritize risks with AI-driven intelligence, and automate remediation — all seamlessly … [Read more...] about CrowdStrike Expands Security to Unmanaged Network Assets
Understanding the Quantum Threat to Network Security
Confidentiality is a fundamental pillar of information security. In sensitive deployments, such as those involving federal governments, military and defense agencies, and large financial institutions, the demand for confidentiality extends well beyond the typical 5 to 10 years, often reaching 20 years or more. The same also applies to telecom operators and … [Read more...] about Understanding the Quantum Threat to Network Security
Transform Network Security With Cisco Hybrid Mesh Firewall
The need for a robust, and flexible network security architecture has never been more pressing. The distributed nature of modern applications, the complexity of networks, and the explosion of AI applications is preventing progress through complexity. As these hindering complexities shift and grow, our approach to security must evolve to meet them head-on. In the previous … [Read more...] about Transform Network Security With Cisco Hybrid Mesh Firewall
U.S. and Dutch Authorities Dismantle 39 Domains Linked to BEC Fraud Network
Feb 01, 2025Ravie LakshmananCybercrime / Fraud Prevention U.S. and Dutch law enforcement agencies have announced that they have dismantled 39 domains and their associated servers as part of efforts to disrupt a network of online marketplaces originating from Pakistan. The action, which took place on January 29, 2025, has been codenamed Operation Heart Blocker. The vast array … [Read more...] about U.S. and Dutch Authorities Dismantle 39 Domains Linked to BEC Fraud Network
Over 100 Security Flaws Found in LTE and 5G Network Implementations
Jan 24, 2025Ravie LakshmananTelecom Security / Vulnerability A group of academics has disclosed details of over 100 security vulnerabilities impacting LTE and 5G implementations that could be exploited by an attacker to disrupt access to service and even gain a foothold into the cellular core network. The 119 vulnerabilities, assigned 97 unique CVE identifiers, span seven LTE … [Read more...] about Over 100 Security Flaws Found in LTE and 5G Network Implementations
Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation
Jan 17, 2025Ravie LakshmananFirmware Security / Vulnerability Cybersecurity researchers have disclosed three security flaws in Planet Technology's WGS-804HPT industrial switches that could be chained to achieve pre-authentication remote code execution on susceptible devices. "These switches are widely used in building and home automation systems for a variety of networking … [Read more...] about Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation
A Pro-China Influence Network of Fake News Sites
Nov 23, 2024Ravie LakshmananCloud Security / Threat Intelligence Government agencies and non-governmental organizations in the United States have become the target of a nascent China state threat actor known as Storm-2077. The adversary, believed to be active since at least January 2024, has also conducted cyber attacks against the Defense Industrial Base (DIB), aviation, … [Read more...] about A Pro-China Influence Network of Fake News Sites