Quantcast
Channel: Cisco Blog » java
Browsing all 16 articles
Browse latest View live

Exploring a Java Bot: Part 3

In this post we will examine some of the offensive features incorporated into a botnet designed to launch attacks and maintain control of hosts (aka victims).

View Article



Java Exploits Another Example of Tomorrow’s Threat Landscape, Today

The last two years seem dominated by PDF vulnerabilities. As far as the specification and its various readers are concerned, there is likely more sour fruit yet to be uncovered; it's simply too complex...

View Article

Downloading, Carts and Java

More than a year ago, we introduced a feature in the Cisco.com download flow that allows you to download multiple [...]

View Article

Resurrecting MPI and Java

Back in the ’90s, there was a huge bubble of activity about Java in academic circles.  It was the new [...]

View Article

New Java Vulnerability Used in Targeted Attacks

Security researchers discovered a Java vulnerability (documented in IntelliShield alert 26751) that attackers are using to install malicious software on a victim's systems.

View Article


Oracle Java Zero Day Vulnerabilities Risks and Mitigations Part 2

In the previous Part 1 post , I discussed the initial response, risk, and mitigations for the recently-disclosed zero day Oracle Java vulnerabilities [...]

View Article

New Java Vulnerability Being Exploited in the Wild

The new  Oracle Java arbitrary code execution vulnerability   has not only hit many news wires and social media outlets, but many victims as well, and [...]

View Article

MPI and Java: redux

In a prior blog entry, I discussed how we are resurrecting a Java interface for MPI in the upcoming v1.7 [...]

View Article


Why I Chose the Open Source Model I did for OpenDaylight

Now that OpenDaylight  has arrived, it’s time to explain why I made the Open Source choices eventually embraced by its  Founders  and [...]

View Article


Big Data in Security – Part I: TRAC Tools

Recently I had an opportunity to sit down with the talented data scientists from Cisco’s Threat Research, Analysis, and Communications (TRAC) [...]

View Article

Cisco is bringing together networking and programming

Well Cisco has done it. I have worked in IT since 1995 and never learned programming. Sure, I can do [...]

View Article

Fiesta Exploit Pack is No Party for Drive-By Victims

This post was also authored by Andrew Tsonchev and Steven Poulson. Cisco’s Cloud Web Security (CWS) service provides TRAC researchers with a [...]

View Article

Summary: Cisco is bringing together networking and programming

With the announcements on NX-OS APIs, Application Centric infrastructure APIs , python scripting support, SDN, open source projects OpenStack , OpenDaylight, and Puppet, I have [...]

View Article


Java Bindings for Open MPI

Today’s guest blog post is from Oscar Vega-Gisbert and Dr. Jose Roman from the Department of Information Systems and Computing at the Universitat Politècnica de [...]

View Article

Angling for Silverlight Exploits

This post is co-authored by Andrew Tsonchev, Jaeson Schultz, Alex Chiu, Seth Hanford, Craig Williams, Steven Poulson, and Joel Esler. Special thanks [...]

View Article


Cisco 2015 Annual Security Report: Java on the Decline as Attack Vector

As recently as 2013, vulnerabilities involving Java appeared to be a favored tool of adversaries: Java was easy to exploit and, and exploits involving the programming language were difficult to detect....

View Article
Browsing all 16 articles
Browse latest View live




Latest Images