Home Tags Packet

Tag: Packet

Cisco StarOS CLI Command Injection Vulnerability

A vulnerability in the CLI command-parsing code of the Cisconbsp;StarOS operating system for Cisconbsp;ASR 5000 Series, 5500 Series, and 5700 Series devices and Cisconbsp;Virtualized Packet Corenbsp;(VPC) Software could allow a...

Cisco Wide Area Application Services Core Dump Denial of Service Vulnerability

A vulnerability in the Server Message Block (SMB) protocol of Cisconbsp;Wide Area Application Services (WAAS) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device due t...

Small Cell Forum and ITRI take leap forward in private networks

SCFrsquo;s fifth LTE Plugfest event focused on private evolved packet cores – a key enabling technology for enterprise small cell use cases London, 3rd July 2017 Small Cell Forum (SCF) has successfully completed its fifth LTE Plugfest, hosted by ITRI, Taiwanrsquo;s world-leading technology institute.

The Plugfest was one of the first events in the world to test interoperability for private evolved packet cores (EPCs).

These are key enablers for enterprise private networks, which are a... Source: RealWire

SNMP Remote Code Execution Vulnerabilities in Cisco IOS and IOS XE...

The Simple Network Management Protocolnbsp;(SNMP) subsystem of Cisconbsp;IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system ...

Logicalis acquires Packet Systems Indonesia to Grow Customer Base and Strengthen...

London, 20 June, 2017 – Logicalis, an international IT solutions and managed services provider, together with Metrodata, a dominant ICT company in Indonesia, today announced it has agreed to acquire Packet Systems Indonesia (PSI), a leading ICT systems integrator and services company. PSI is a Cisco Gold Partner specialising in data centre, collaboration, Service Provider & Enterprise Network, and information security solutions. PSI will be integrated with the existing Indonesian operation, Logicalis Metrodata Indonesia (LMI),... Source: RealWire

Aricent’s Intelligent Switching Solution Scales for Mega Datacenters Supporting Marvell Prestera...

Aricentrsquo;s Intelligent Switching Solution delivers datacenter fabric architectures with Marvellrsquo;s Prestera 98CX84xx family of packet processors REDWOOD CITY, California — June 13, 2017 – Aricent, a global design and engineering company, and a leader in datacenter networking infrastructure announced its Intelligent Switching Solution (ISS) Release 10.1 upgrade at Computex 2017 in Taipei, Taiwan last week.

The new release is designed to support web scale data centers that run thousands of servers and network port speeds... Source: RealWire

50 hashes per hour

In this research we'll be revisiting the USB port – this time in attempts to intercept user authentication data on the system that a microcomputer is connected to.

As we discovered, this type of attack successfully allows an intruder to retrieve user authentication data – even when the targeted system is locked.

Dridex: A History of Evolution

In the several years that the Dridex family has existed, there have been numerous unsuccessful attempts to block the botnetrsquo;s activity.

The ongoing evolution of the malware demonstrates that the cybercriminals are not about to bid farewell to their brainchild, which is providing them with a steady revenue stream.

Cisco TelePresence ICMP Denial of Service Vulnerability

A vulnerability in the ICMP ingress packet processing of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an unauthenticated, remote attacker to cause the TelePresence endpoint to reload unexpectedly, resulting i...

Use of DNS Tunneling for C&C Communications

Often, virus writers don't even bother to run encryption or mask their communications. However, you do get the occasional off-the-wall approaches that don't fall into either of the categories.

Take, for instance, the case of a Trojan that Kaspersky Lab researchers discovered in mid-March and which establishes a DNS tunnel for communication with the C&C server.

SDN dilemma: Linux kernel networking vs. kernel bypass

Sujal Das is chief strategy and marketing officer at Netronome, a provider of high-performance x86 co-processing solutions for networking, security, load balancing, virtualization, and SDN.If we've learned anything in the technology business in the last 25 years, it would be to never underestimate the Linux kernel. Why, then, have so many networking companies been so eager to bypass the Linux kernel -- or more specifically, the Linux kernel networking stack? What could be so wrong with the networking packet arteries in the Linux kernel that motivates so many of us to bypass them?To read this article in full or to leave a comment, please click here

Inmates built computers hidden in ceiling, connected them to prison network

Ohio prison's lax supervision was akin to "an episode from Hogan's Heroes."