eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

205
active users

#cisco

7 posts7 participants1 post today
WinFuture.de<p>Der KI-Boom führt zu überraschender Entwicklung: Unternehmen wie <a href="https://mastodon.social/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> und <a href="https://mastodon.social/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> kehren zu persönlichen Vorstellungsgesprächen zurück - als Schutz vor KI. <a href="https://winfuture.de/news,152918.html?utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winfuture.de/news,152918.html?</span><span class="invisible">utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia</span></a></p>
Gif's Artidote<p>After waking up with the news that the entire remaining AlJazeera team of journalists in <a href="https://mastodon.social/tags/gaza" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gaza</span></a> has been murdered as well as 500 arrests of mostly elderly pensioners peacefully protesting the <a href="https://mastodon.social/tags/PalestinianGenocide" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PalestinianGenocide</span></a> and supporting PA in <a href="https://mastodon.social/tags/london" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>london</span></a> yesterday, i have postponed my <a href="https://mastodon.social/tags/CrimPsych" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrimPsych</span></a> course at the <a href="https://mastodon.social/tags/OpenUniversity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenUniversity</span></a> for the second yr running.<br>i have told the <a href="https://mastodon.social/tags/OU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OU</span></a> exactly why:</p><p>as long as the uni uses my tuition fees to fund <a href="https://mastodon.social/tags/BAE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BAE</span></a> <a href="https://mastodon.social/tags/cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cisco</span></a> <a href="https://mastodon.social/tags/alphabet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>alphabet</span></a> (<a href="https://mastodon.social/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a>) <a href="https://mastodon.social/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> &amp; others carrying out <a href="https://mastodon.social/tags/warcrimes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>warcrimes</span></a>...</p>
Tekno Fix - IT Solutions<p>Cisco has disclosed that cybercriminals stole the basic profile information of users registered on the Cisco website following a voice phishing (vishing) attack that targeted a company representative.</p><p><a href="https://mstdn.social/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://mstdn.social/tags/PC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PC</span></a> <a href="https://mstdn.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mstdn.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mstdn.social/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://mstdn.social/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://mstdn.social/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://mstdn.social/tags/Computing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Computing</span></a> <a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/Business" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Business</span></a> <a href="https://mstdn.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechNews</span></a> <a href="https://mstdn.social/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://mstdn.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a> <a href="https://mstdn.social/tags/SocialMedia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialMedia</span></a> <a href="https://mstdn.social/tags/Mastodon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mastodon</span></a> <a href="https://mstdn.social/tags/Fediverse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fediverse</span></a></p>
RF Wave<p>Cisco has revealed they were victim of a data breach</p><p>Timing: Cisco became aware of incident on July 24, 2025</p><p>Impact:<br>- Personal info of registered users on Cisco.com were stolen</p><p>Remediation:<br>- Breach notifications sent out to affected users<br>- Notified appropriate data protection authorities</p><p><a href="https://mstdn.ca/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mstdn.ca/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://mstdn.ca/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-discloses-data-breach-impacting-ciscocom-user-accounts/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisco-discloses-data-breach-impacting-ciscocom-user-accounts/</span></a></p>
#cryptohagen<p>Data fra Googles Salesforce-konto: Google bekræftede sikkerhedsbruddet <br>..at de fleste af de stjålne data var offentligt tilgængelige forretnings-oplysninger<br><a href="https://cloud.google.com/blog/topics/threat-intelligence/voice-phishing-data-extortion" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cloud.google.com/blog/topics/t</span><span class="invisible">hreat-intelligence/voice-phishing-data-extortion</span></a></p><p>🇩🇰 Pandora informerer sine kunder om et sikkerhedsbrud Ifølge rapporter er Pandora det seneste firma, der har fået hacket sin Salesforce</p><p>Det slutter sig dermed til ovennævnte Google samt <a href="https://social.data.coop/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> og KLM/AirFrance, Chanel, som også har offentliggjort lignende sikkerhedsbrud i denne uge <br><a href="https://www.bleepingcomputer.com/news/security/pandora-confirms-data-breach-amid-ongoing-salesforce-data-theft-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/pandora-confirms-data-breach-amid-ongoing-salesforce-data-theft-attacks/</span></a></p>
Tekno Fix - IT Solutions<p>Cisco has disclosed that cybercriminals stole the basic profile information of users registered on the Cisco website following a voice phishing (vishing) attack that targeted a company representative.</p><p><a href="https://mstdn.social/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://mstdn.social/tags/PC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PC</span></a> <a href="https://mstdn.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mstdn.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mstdn.social/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://mstdn.social/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://mstdn.social/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://mstdn.social/tags/Computing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Computing</span></a> <a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/Business" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Business</span></a> <a href="https://mstdn.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechNews</span></a> <a href="https://mstdn.social/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://mstdn.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a> <a href="https://mstdn.social/tags/SocialMedia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialMedia</span></a> <a href="https://mstdn.social/tags/Mastodon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mastodon</span></a> <a href="https://mstdn.social/tags/Fediverse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fediverse</span></a></p>
John Leonard<p>Google and Cisco, have disclosed separate data breaches stemming from voice phishing (vishing) attacks that compromised customer information stored in cloud-based CRM systems.</p><p><a href="https://www.computing.co.uk/news/2025/security/google-and-cisco-confirm-data-breaches-linked-to-vishing" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">computing.co.uk/news/2025/secu</span><span class="invisible">rity/google-and-cisco-confirm-data-breaches-linked-to-vishing</span></a></p><p><a href="https://mastodon.social/tags/salesforce" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>salesforce</span></a> <a href="https://mastodon.social/tags/cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cisco</span></a> <a href="https://mastodon.social/tags/google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>google</span></a> <a href="https://mastodon.social/tags/shinyhunters" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shinyhunters</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/technews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technews</span></a> <a href="https://mastodon.social/tags/UNC6040" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UNC6040</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> discloses <a href="https://mastodon.thenewoil.org/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> impacting Cisco(dot)com user accounts</p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-discloses-data-breach-impacting-ciscocom-user-accounts/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisco-discloses-data-breach-impacting-ciscocom-user-accounts/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
OpenTalk<p>Hochwertige Cisco-Room-Kits wieder sinnvoll nutzen? Geht – mit OpenTalk. </p><p>Im Fachbeitrag für IPInsider erklärt unser Kollege Daniél Kerkmann, wie die SIP-Anbindung in unsere Open Source-Videokonferenzlösung funktioniert – ganz ohne Vendor Lock-in.</p><p><a href="https://www.ip-insider.de/cisco-room-kits-an-opentalk-anbinden-a-2ca7e1fb364cad7b34f06cbb3ad18bb0/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ip-insider.de/cisco-room-kits-</span><span class="invisible">an-opentalk-anbinden-a-2ca7e1fb364cad7b34f06cbb3ad18bb0/</span></a></p><p><a href="https://social.opentalk.eu/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://social.opentalk.eu/tags/SIP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIP</span></a> <a href="https://social.opentalk.eu/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://social.opentalk.eu/tags/WebRTC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebRTC</span></a> <a href="https://social.opentalk.eu/tags/DigitaleSouver%C3%A4nit%C3%A4t" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitaleSouveränität</span></a> <a href="https://social.opentalk.eu/tags/OpenTalk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenTalk</span></a> <a href="https://social.opentalk.eu/tags/ITInfrastruktur" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITInfrastruktur</span></a> <a href="https://social.opentalk.eu/tags/Videokonferenz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Videokonferenz</span></a></p>
PrivacyDigest<p><a href="https://mas.to/tags/Voice" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Voice</span></a> <a href="https://mas.to/tags/phishers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishers</span></a> strike again, this time hitting <a href="https://mas.to/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <br><a href="https://mas.to/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/scam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scam</span></a></p><p><a href="https://arstechnica.com/security/2025/08/attackers-who-phished-cisco-downloaded-user-data-from-third-party-crm/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">08/attackers-who-phished-cisco-downloaded-user-data-from-third-party-crm/</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> disclosed a CRM data breach via vishing attack<br><a href="https://securityaffairs.com/180816/data-breach/cisco-disclosed-a-crm-data-breach-via-vishing-attack.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/180816/dat</span><span class="invisible">a-breach/cisco-disclosed-a-crm-data-breach-via-vishing-attack.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
Edwin G. :mapleleafroundel:<p>Cisco discloses data breach impacting Cisco.com user accounts</p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-discloses-data-breach-impacting-ciscocom-user-accounts/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisco-discloses-data-breach-impacting-ciscocom-user-accounts/</span></a><br>- - -<br>Cisco divulgue une dérobation de données affectant les comptes d'utilisateurs de Cisco.com</p><p>// Article en anglais //</p><p><a href="https://mstdn.moimeme.ca/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://mstdn.moimeme.ca/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationSecurity</span></a> <a href="https://mstdn.moimeme.ca/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mstdn.moimeme.ca/tags/Cybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersécurité</span></a> <a href="https://mstdn.moimeme.ca/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://mstdn.moimeme.ca/tags/TI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TI</span></a> <a href="https://mstdn.moimeme.ca/tags/InformationTechnology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationTechnology</span></a> <a href="https://mstdn.moimeme.ca/tags/Technologies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technologies</span></a></p>
It's FOSS<p>Cisco has donated the AGNTCY project to the Linux Foundation.</p><p><a href="https://news.itsfoss.com/agntcy-project-joins-linux-foundation/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.itsfoss.com/agntcy-projec</span><span class="invisible">t-joins-linux-foundation/</span></a></p><p><a href="https://mastodon.social/tags/linuxfoundation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linuxfoundation</span></a> <a href="https://mastodon.social/tags/cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cisco</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a></p>
Bill<p>Didn't we have a small howl on here about this Cisco ISE RCE vuln and how patches were slow?</p><p>Welp, POC is out. Pretty neat too.</p><p><a href="https://www.thezdi.com/blog/2025/7/24/cve-2025-20281-cisco-ise-api-unauthenticated-remote-code-execution-vulnerability" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">thezdi.com/blog/2025/7/24/cve-</span><span class="invisible">2025-20281-cisco-ise-api-unauthenticated-remote-code-execution-vulnerability</span></a></p><p><a href="https://infosec.exchange/tags/cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cisco</span></a> <a href="https://infosec.exchange/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a></p>
The New Oil<p>Exploit available for critical <a href="https://mastodon.thenewoil.org/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> ISE bug exploited in attacks</p><p><a href="https://www.bleepingcomputer.com/news/security/exploit-available-for-critical-cisco-ise-bug-exploited-in-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/exploit-available-for-critical-cisco-ise-bug-exploited-in-attacks/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
securityaffairs<p>U.S. <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> adds <a href="https://infosec.exchange/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> ISE and <a href="https://infosec.exchange/tags/PaperCut" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PaperCut</span></a> NG/MF flaws to its Known Exploited Vulnerabilities catalog<br><a href="https://securityaffairs.com/180494/security/u-s-cisa-adds-cisco-ise-and-papercut-ng-mf-flaws-to-its-known-exploited-vulnerabilities-catalog.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/180494/sec</span><span class="invisible">urity/u-s-cisa-adds-cisco-ise-and-papercut-ng-mf-flaws-to-its-known-exploited-vulnerabilities-catalog.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a>: Maximum-severity <a href="https://mastodon.thenewoil.org/tags/ISE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ISE</span></a> RCE flaws now exploited in attacks</p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-maximum-severity-ise-rce-flaws-now-exploited-in-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisco-maximum-severity-ise-rce-flaws-now-exploited-in-attacks/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
heise online English<p>Cisco Identity Services Engine: Attack on old gaps – update now</p><p>In recent weeks, Cisco has closed critical ISE gaps – and now the company is warning of exploits. Anyone who has not yet patched should act immediately. </p><p><a href="https://www.heise.de/en/news/Cisco-Identity-Services-Engine-Attack-on-old-gaps-update-now-10497211.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Cisco-Identit</span><span class="invisible">y-Services-Engine-Attack-on-old-gaps-update-now-10497211.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise Security<p>Cisco Identity Services Engine: Angriff auf alte Lücken – jetzt Update nachholen</p><p>In den vergangenen Wochen schloss Cisco kritische ISE-Lücken – jetzt warnt das Unternehmen vor Exploits. Wer noch nicht gepatcht hat, sollte umgehend handeln. </p><p><a href="https://www.heise.de/news/Cisco-Identity-Services-Engine-Angriff-auf-alte-Luecken-jetzt-Update-nachholen-10497006.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Cisco-Identity-S</span><span class="invisible">ervices-Engine-Angriff-auf-alte-Luecken-jetzt-Update-nachholen-10497006.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> confirms active exploitation of ISE and ISE-PIC flaws<br><a href="https://securityaffairs.com/180260/hacking/cisco-confirms-active-exploitation-of-ise-and-ise-pic-flaws.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/180260/hac</span><span class="invisible">king/cisco-confirms-active-exploitation-of-ise-and-ise-pic-flaws.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>