IOS
Checkrain fake iOS jailbreak leads to click fraud
Attackers are capitalizing on the recent discovery of a new vulnerability that exists across legacy iOS hardware. Cisco Talos recently discovered a malicious actor using a fake website that claims to give iPhone users the ability to jailbreak their phones. However, this site just prompts users to do…
New Forensic Investigation Procedures for First Responder Guides
Cisco is pleased to announce a new series of Forensic Investigation Procedures for First Responders guides that will help customers and partners triage Cisco products that are suspected of being tampered with or compromised. These guides provide step-by-step instructions for collecting information t…
On-Box Python for Cisco Devices – the Why, What, and How
As a junior network engineer at a university I wrote a lot of management scripts in Perl. I had scripts to do things such as check switchport configurations and upgrade switch code. Times have changed a lot since then. The university’s web server now runs in the cloud, rather than on my personal wo…
Automating Your Network Operations, Part 1 – Ansible Basics
In this blog series we’ll take you beyond the hype and dive more deeply into how and why to automate your network operations. I’ve spent the last couple of years at Red Hat helping customers automate their networks with Ansible. If there is one thing that I’ve learned during that time, it is t…
Advanced Mobile Malware Campaign in India uses Malicious MDM – Part 2
This blog post is authored by Warren Mercer and Paul Rascagneres and Andrew Williams. Summary Since our initial post on malicious mobile device management (MDM) platforms, we have gathered more information about this actor that we believe shows it is part of a broader campaign targeting multiple pla…
Advanced Mobile Malware Campaign in India uses Malicious MDM
This blog post is authored by Warren Mercer and Paul Rascagneres and Andrew Williams. Summary Cisco Talos has identified a highly targeted campaign against 13 iPhones which appears to be focused on India. The attacker deployed an open-source mobile device management (MDM) system to control enrolled…
Best Security Practices for Fog Computing
For several years now, Cisco has been advocating for Fog Computing as an essential element of a scalable, reliable and cost effective IoT architecture. By developing Industrial IoT solutions based on Cisco IOx, data originating from “things” can be locally filtered, analyzed and manipulated on IIoT…
Completely Changing the Way Your Network Runs
Before you get into the meat of this blog, I encourage you to take a peek at Cisco’s newest video for Cisco DNA Center Assurance. Yes, it’s an ad, but trust me this one is definitely worth your time: When Cisco makes a new product announcement, it’s usually a big splash in the ind…
Apple and Cisco Partnership Continues to Deliver Great User Experiences for Mobile Users
In the previous blog we shared how the first round of innovations coming from the Apple and Cisco partnership enabled enterprise Wi-Fi users to be more productive as they move within the environment as well as enabled IT to prioritize business-critical applications over the air, something that hasn’…