Feb 13, 2025Ravie LakshmananWeb Security / Cloud Security A widespread phishing campaign has been observed leveraging bogus PDF documents hosted on the Webflow content delivery network (CDN) with an aim to steal credit card information and commit financial fraud. "The attacker targets victims searching for documents on search engines, resulting in access to malicious PDF that … [Read more...] about Hackers Use CAPTCHA Trick on Webflow CDN PDFs to Bypass Security Scanners
security
How Adversary Taxonomies Strengthen Global Security
Last month, during testimony on global cyber threats before the U.S. Committee on Homeland Security, a longstanding debate resurfaced: Why do vendors name different cyber threat actors, and can’t we directly call out those responsible? Industry veterans will recognize that a discourse on this topic tends to pop up in vendor, media, and public policy circles every few … [Read more...] about How Adversary Taxonomies Strengthen Global Security
Cisco and Wiz Unite to Enhance Cloud Security
A Growing Challenge in Cloud Security In today’s fast-paced digital world, enterprises face a new urgency in cloud security. AI-driven tools have drastically reduced the time it takes to develop exploit kits, from 15 days to under 5. However, enterprise teams often need over 60 days to patch vulnerabilities across varied environments. This leaves a significant gap where … [Read more...] about Cisco and Wiz Unite to Enhance Cloud Security
Transform Network Security With Cisco Hybrid Mesh Firewall
The need for a robust, and flexible network security architecture has never been more pressing. The distributed nature of modern applications, the complexity of networks, and the explosion of AI applications is preventing progress through complexity. As these hindering complexities shift and grow, our approach to security must evolve to meet them head-on. In the previous … [Read more...] about Transform Network Security With Cisco Hybrid Mesh Firewall
Evaluating Security Risk in DeepSeek
This original research is the result of close collaboration between AI security researchers from Robust Intelligence, now a part of Cisco, and the University of Pennsylvania including Yaron Singer, Amin Karbasi, Paul Kassianik, Mahdi Sabbaghi, Hamed Hassani, and George Pappas. Executive Summary This article investigates vulnerabilities in DeepSeek R1, a new frontier … [Read more...] about Evaluating Security Risk in DeepSeek
GenAI and RAG: Transforming security, fraud detection, and observability
GenAI is not magicI attended ElasticON recently where we spent the day with our NYC Elastic community, talking about the combined value of vector databases using retrieval augmented generation (RAG) to feed large language models (LLMs) for next-level generative AI (GenAI) results. Elastic’s CTO and Founder Shay Banon kicked off his keynote with an important message: GenAI is … [Read more...] about GenAI and RAG: Transforming security, fraud detection, and observability
Transforming fraud detection: AI and Elastic Security in financial services
Fraud in financial services is becoming more sophisticated, costing the industry billions annually and eroding customer trust. Recently, Deloitte published an article highlighting the risk AI brings in the form of fraudsters to the financial services industry: “Fake content has never been easier to create — or harder to catch. As threats grow, banks can invest in AI and other … [Read more...] about Transforming fraud detection: AI and Elastic Security in financial services
Over 100 Security Flaws Found in LTE and 5G Network Implementations
Jan 24, 2025Ravie LakshmananTelecom Security / Vulnerability A group of academics has disclosed details of over 100 security vulnerabilities impacting LTE and 5G implementations that could be exploited by an attacker to disrupt access to service and even gain a foothold into the cellular core network. The 119 vulnerabilities, assigned 97 unique CVE identifiers, span seven LTE … [Read more...] about Over 100 Security Flaws Found in LTE and 5G Network Implementations
Simplifying Zero Trust Security for the Modern Workplace
Organizations face an evolving array of cyber threats these days. As attackers have become more sophisticated, it is important to adopt a comprehensive security strategy that includes a layered approach and increased protection for the modern workplace. That includes the home office, branch, campus, coffee shop, or anywhere in between. Cisco’s Enhanced User Protection … [Read more...] about Simplifying Zero Trust Security for the Modern Workplace
Modern Security for Legacy Environments
Many organizations across critical industries such as healthcare, manufacturing and energy rely on legacy Windows operating systems to run essential equipment. These systems, while operationally vital, are notoriously difficult and costly to upgrade — leaving them vulnerable to modern cyber threats. CrowdStrike is addressing this challenge by expanding our legacy support … [Read more...] about Modern Security for Legacy Environments