IOS

October 15, 2019

THREAT RESEARCH

Checkrain fake iOS jailbreak leads to click fraud

Attackers are capitalizing on the recent discovery of a new vulnerability that exists across legacy iOS hardware. Cisco Talos recently discovered a malicious actor using a fake website that claims to give iPhone users the ability to jailbreak their phones. However, this site just prompts users to do…

August 30, 2019

SECURITY

New Forensic Investigation Procedures for First Responder Guides

Cisco is pleased to announce a new series of Forensic Investigation Procedures for First Responders guides that will help customers and partners triage Cisco products that are suspected of being tampered with or compromised. These guides provide step-by-step instructions for collecting information t…

November 1, 2018

DEVELOPER

On-Box Python for Cisco Devices – the Why, What, and How

As a junior network engineer at a university I wrote a lot of management scripts in Perl.  I had scripts to do things such as check switchport configurations and upgrade switch code. Times have changed a lot since then. The university’s web server now runs in the cloud, rather than on my personal wo…

September 5, 2018

DEVELOPER

Automating Your Network Operations, Part 1 – Ansible Basics

In this blog series we’ll take you beyond the hype and dive more deeply into how and why to automate your network operations. I’ve spent the last couple of years at Red Hat helping customers automate their networks with Ansible. If there is one thing that I’ve learned during that time, it is t…

July 24, 2018

THREAT RESEARCH

Advanced Mobile Malware Campaign in India uses Malicious MDM – Part 2

This blog post is authored by Warren Mercer and Paul Rascagneres and Andrew Williams. Summary Since our initial post on malicious mobile device management (MDM) platforms, we have gathered more information about this actor that we believe shows it is part of a broader campaign targeting multiple pla…

July 12, 2018

THREAT RESEARCH

Advanced Mobile Malware Campaign in India uses Malicious MDM

This blog post is authored by Warren Mercer and Paul Rascagneres and Andrew Williams. Summary Cisco Talos has identified a highly targeted campaign against 13 iPhones which appears to be focused on India. The attacker deployed an open-source mobile device management (MDM) system to control enrolled…

Best Security Practices for Fog Computing

For several years now, Cisco has been advocating for Fog Computing as an essential element of a scalable, reliable and cost effective IoT architecture. By developing Industrial IoT solutions based on Cisco IOx, data originating from “things” can be locally filtered, analyzed and manipulated on IIoT…

February 15, 2018

NETWORKING

Completely Changing the Way Your Network Runs

Before you get into the meat of this blog, I encourage you to take a peek at Cisco’s newest video for Cisco DNA Center Assurance. Yes, it’s an ad, but trust me this one is definitely worth your time: When Cisco makes a new product announcement, it’s usually a big splash in the ind…

June 23, 2017

NETWORKING

Apple and Cisco Partnership Continues to Deliver Great User Experiences for Mobile Users

In the previous blog we shared how the first round of innovations coming from the Apple and Cisco partnership enabled enterprise Wi-Fi users to be more productive as they move within the environment as well as enabled IT to prioritize business-critical applications over the air, something that hasn’…