Tag: cisco
-
Phishing, sometimes with AI’s help, topped initial-access methods in Q1, Cisco says
Hackers can now spin up fake login pages without writing a single line of code. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/phishing-initial-access-ai-cisco/818185/
-
Anthropic bets on EPSS for the coming bug surge
Tags: ai, cisco, ciso, cloud, crowdstrike, cve, cvss, cyber, data, exploit, flaw, government, Hardware, healthcare, infrastructure, network, update, vulnerabilitySecurity leaders weigh promise versus reality: Security vendors are increasingly incorporating EPSS scores into their systems.According to Roytman, EPSS has been incorporated into more than 120 security vendors’ products, including CrowdStrike, Cisco, Palo Alto Networks, Qualys, and Tenable platforms.”I do not think other CISOs realize how broadly EPSS has been adopted, but that adoption is…
-
Iran Alleges US Networking Gear Was Deliberately Disabled
Reports from Iranian state media claim that U.S.-manufactured networking gear ceased functioning at critical moments during military strikes. The allegations, which cannot be independently verified, claim there were simultaneous failures across routers and switches produced by Cisco, Fortinet, Juniper Networks, and MikroTik during attacks on Iranian infrastructure. According to accounts published by the Iranian Fars..…
-
Iran Alleges US Networking Gear Was Deliberately Disabled
Reports from Iranian state media claim that U.S.-manufactured networking gear ceased functioning at critical moments during military strikes. The allegations, which cannot be independently verified, claim there were simultaneous failures across routers and switches produced by Cisco, Fortinet, Juniper Networks, and MikroTik during attacks on Iranian infrastructure. According to accounts published by the Iranian Fars..…
-
Iran Alleges US Networking Gear Was Deliberately Disabled
Reports from Iranian state media claim that U.S.-manufactured networking gear ceased functioning at critical moments during military strikes. The allegations, which cannot be independently verified, claim there were simultaneous failures across routers and switches produced by Cisco, Fortinet, Juniper Networks, and MikroTik during attacks on Iranian infrastructure. According to accounts published by the Iranian Fars..…
-
More Cisco SD-WAN bugs battered in attacks
CISA gives federal agencies 4 days to patch First seen on theregister.com Jump to article: www.theregister.com/2026/04/21/cisco_sdwan_bugs_kev/
-
More Cisco SD-WAN bugs battered in attacks
CISA gives federal agencies 4 days to patch First seen on theregister.com Jump to article: www.theregister.com/2026/04/21/cisco_sdwan_bugs_kev/
-
CISA confirms exploitation of 3 more Cisco networking device vulnerabilities
Cisco revealed six critical flaws in widely used products in February. The government has now seen evidence that hackers are abusing four of them. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisa-cisco-vulnerabilities-sd-wan-confirm-exploitation/818064/
-
CISA flags another Cisco Catalyst SD-WAN Manager bug as exploited (CVE-2026-20133)
CISA added eight new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, including a Cisco Catalyst SD-WAN Manager vulnerability (CVE-2026-20133) that Cisco … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/21/cisa-flags-another-cisco-catalyst-sd-wan-manager-bug-as-exploited-cve-2026-20133/
-
CISA flags another Cisco Catalyst SD-WAN Manager bug as exploited (CVE-2026-20133)
CISA added eight new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, including a Cisco Catalyst SD-WAN Manager vulnerability (CVE-2026-20133) that Cisco … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/21/cisa-flags-another-cisco-catalyst-sd-wan-manager-bug-as-exploited-cve-2026-20133/
-
Bad Apples: Weaponizing native macOS primitives for movement and execution
Cisco Talos documents several macOS living-off-the-land (LOTL) techniques, demonstrating that native pathways for movement and execution remain accessible to those who understand the underlying architecture. First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/bad-apples-weaponizing-native-macos-primitives-for-movement-and-execution/
-
U.S. CISA adds Cisco Catalyst, Kentico Xperience, PaperCut NG/MF, Synacor ZCS, Quest KACE SMA, and JetBrains TeamCity flaws to its Known Exploited Vulnerabilities catalog
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Cisco Catalyst, Kentico Xperience, PaperCut NG/MF, Synacor ZCS, Quest KACE SMA, and JetBrains TeamCity flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Cisco Catalyst, Kentico Xperience, PaperCut NG/MF, Synacor ZCS, Quest KACE SMA, and JetBrains TeamCity flaws to its Known…
-
CISA Adds 8 Exploited Vulnerabilities Affecting Cisco, Zimbra, TeamCity
The Cybersecurity and Infrastructure Security Agency (CISA) have expanded its Known Exploited Vulnerabilities, commonly referred to as the KEV catalog, with eight newly identified security flaws that are currently being exploited in real-world attacks. The update was announced on April 21, 2026. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/cisa-kev-catalog-vulnerabilities/
-
CISA Alerts Defenders to Exploited Cisco Catalyst SD-WAN Manager Security Flaws
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning to network defenders regarding the active exploitation of Cisco Catalyst SD-WAN Manager. On April 20, 2026, CISA officially added three distinct security flaws affecting the platform to its Known Exploited Vulnerabilities (KEV) catalog. Cisco Catalyst SD-WAN Manager is a critical administrative console used…
-
CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines
Tags: authentication, cisa, cisco, cve, cybersecurity, exploit, flaw, infrastructure, kev, vulnerabilityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added eight new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, including three flaws impacting Cisco Catalyst SD-WAN Manager, citing evidence of active exploitation.The list of vulnerabilities is as follows -CVE-2023-27351 (CVSS score: 8.2) – An improper authentication vulnerability in PaperCut First seen on thehackernews.com…
-
AI Changes Focus to Real-Time Cyber Defense
Cisco’s Jeetu Patel on How Machine-Speed Threats Drive Need for AI-Led Security. Cisco’s Jeetu Patel explains how AI models are compressing exploit timelines to minutes, forcing a shift to machine-speed defense, real-time enforcement and deeper ecosystem collaboration to secure critical infrastructure and stay ahead of adversaries. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ai-changes-focus-to-real-time-cyber-defense-a-31463
-
(g+) Cisco FMC Zero-Day Interlock: Totalverlust der Netzwerksicherheit
Interlock hat eine CVSS-10-Lücke in Ciscos FMC 36 Tage als Zero-Day genutzt. So wurde das Firewall-Management-Interface zum Einfallstor. First seen on golem.de Jump to article: www.golem.de/news/cisco-fmc-zero-day-interlock-totalverlust-der-netzwerksicherheit-2604-207761.html
-
Cisco Wi-Fi boxes are filling their disks with 5MB of undeletable data every day
Fix for critical flaw is an OS update you may not be able to make because the junk data uses all memory First seen on theregister.com Jump to article: www.theregister.com/2026/04/17/cisco_wifi_ap_useless_data/
-
Flawed Cisco update threatens to stop APs from getting further patches
This article originally appeared on NetworkWorld. First seen on csoonline.com Jump to article: www.csoonline.com/article/4160507/flawed-cisco-update-threatens-to-stop-aps-from-getting-further-patches-2.html
-
New Phishing Attack Turns n8n Into On-Demand Malware Machine
Hackers are abusing n8n workflows to deliver malware and evade detection, according to Cisco Talos, using trusted automation to bypass security defenses. The post New Phishing Attack Turns n8n Into On-Demand Malware Machine appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-hackers-abuse-n8n-workflows-malware-delivery/
-
Datei wächst ohne Ende: Cisco gesteht Softwarepanne bei unzähligen Access-Points
Zahlreiche WiFi-Access-Points von Cisco büßen durch einen Bug täglich 5 Mbyte an Speicherplatz ein. Es drohen fehlschlagende Updates und Bootschleifen. First seen on golem.de Jump to article: www.golem.de/news/protokolldatei-waechst-speicherpanne-bei-ueber-230-access-point-modellen-von-cisco-2604-207679.html
-
Datei wächst ohne Ende: Cisco gesteht Softwarepanne bei unzähligen Access-Points
Zahlreiche WiFi-Access-Points von Cisco büßen durch einen Bug täglich 5 Mbyte an Speicherplatz ein. Es drohen fehlschlagende Updates und Bootschleifen. First seen on golem.de Jump to article: www.golem.de/news/protokolldatei-waechst-speicherpanne-bei-ueber-230-access-point-modellen-von-cisco-2604-207679.html
-
Datei wächst ohne Ende: Speicherpanne bei über 230 Access-Point-Modellen von Cisco
Unzählige WiFi-Access-Points von Cisco büßen durch einen Bug täglich 5 Mbyte an Speicherplatz ein. Es drohen fehlschlagende Updates und Bootschleifen. First seen on golem.de Jump to article: www.golem.de/news/protokolldatei-waechst-speicherpanne-bei-ueber-230-access-point-modellen-von-cisco-2604-207679.html
-
PowMix botnet targets Czech workforce
Cisco Talos discovered an ongoing malicious campaign, operating since at least December 2025, affecting a broader workforce in the Czech Republic with a previously undocumented botnet we call “PowMix.” First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/powmix-botnet-targets-czech-workforce/
-
The n8n n8mare: How threat actors are misusing AI workflow automation
Cisco Talos research has uncovered agentic AI workflow automation platform abuse in emails. Recently, we identified an increase in the number of emails that abuse n8n, one of these platforms, from as early as October 2025 through March 2026. First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/the-n8n-n8mare/
-
Cisco fixed four critical flaws in Identity Services and Webex
Cisco fixed four critical flaws in Identity Services and Webex that could allow code execution and user impersonation. Cisco has addressed four critical vulnerabilities affecting its Identity Services and Webex platforms. The flaws could allow attackers to execute arbitrary code and impersonate any user within the affected services. The issues pose serious security risks, prompting…
-
Cisco fixed four critical flaws in Identity Services and Webex
Cisco fixed four critical flaws in Identity Services and Webex that could allow code execution and user impersonation. Cisco has addressed four critical vulnerabilities affecting its Identity Services and Webex platforms. The flaws could allow attackers to execute arbitrary code and impersonate any user within the affected services. The issues pose serious security risks, prompting…
-
Cisco fixed four critical flaws in Identity Services and Webex
Cisco fixed four critical flaws in Identity Services and Webex that could allow code execution and user impersonation. Cisco has addressed four critical vulnerabilities affecting its Identity Services and Webex platforms. The flaws could allow attackers to execute arbitrary code and impersonate any user within the affected services. The issues pose serious security risks, prompting…
-
Cisco says critical Webex Services flaw requires customer action
Cisco has released security updates to patch four critical vulnerabilities, including a fixed improper certificate validation flaw in the company’s cloud-based Webex Services platform that requires further customer action. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/cisco-says-critical-webex-services-flaw-requires-customer-action/
-
Cisco FMC Zero-Day Among 31 High-Impact Vulnerabilities Exploited in March
31 high-impact vulnerabilities were actively exploited in March 2026, with a Cisco firewall zero-day abused by the Interlock ransomware group emerging as one of the most dangerous threats to enterprise networks. Affected vendors span core enterprise and developer ecosystems, including Cisco, Microsoft, Google, ConnectWise, Langflow, Citrix, Aquasecurity, Nginx UI, Qualcomm, F5, Craft CMS, Laravel, Apple,…

