Thursday, 9 Apr 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > Cisco Talos: 3 post-compromise tactics that threaten your network infrastructure
Global Market

Cisco Talos: 3 post-compromise tactics that threaten your network infrastructure

Last updated: March 9, 2024 1:23 am
Published March 9, 2024
Share
corporate security insider threat hacker spy cybersecurity human resources
SHARE

The unhealthy actors who’re perpetrating superior persistent menace (APT) assaults aren’t simply seeking to entry your community. They wish to sneak in and dangle round to gather beneficial information or lay plans for future assaults.

Publish-compromise threats are rising, and so they’re aimed largely at getting old community infrastructure and edge gadgets which might be long gone end-of-life stage and will have essential unpatched vulnerabilities, in keeping with Nick Biasini, head of outreach at Cisco’s Talos safety analysis arm. “We do see these threats throughout the board. However the older legacy elements have extra avenues for entry, particularly if the gadgets are out of help and so they haven’t been up to date in three or 4 years,” Biasini stated. 

For a very long time, enterprises have taken a hands-off strategy to edge gadgets, type of a “don’t contact it, let it do what it does, and let it maintain operating” strategy, Biasini stated. “It was like a badge of honor to have an edge machine that was on the market operating for 2 or three years. Now, that may be a very, very large legal responsibility, and it’s one thing organizations really want to deal with,” Biasini stated. 

“There’s going to be a number of extra vulnerabilities and potential avenues for adversaries on these gadgets,” Biasini stated, whereas with just lately put in edge gadgets which have up-to-date firmware, the assault floor goes to be decrease. “We do are inclined to see unhealthy actors feasting on these older gadgets,” he stated.

When older gadgets weren’t designed with safety in thoughts, and when community infrastructure sits exterior of safety’s ecosystem, it makes it more and more troublesome to watch community entry makes an attempt, in keeping with Hazel Burton, a world cybersecurity product advertising and marketing supervisor at Cisco. “Adversaries, notably APTs, are capitalizing on this state of affairs to conduct hidden, post-compromise actions as soon as they’ve gained preliminary entry to the community,” Burton wrote in an a blog outlining some of the attack scenarios. “The objective right here is to provide themselves a better foothold, conceal their actions, and hunt for information and intelligence that may help them with their espionage and/or disruptive targets.”

See also  Amazon waives entire month's AWS charges after Iranian drone attack

Biasini stated there are two foremost teams of unhealthy actors which might be focusing on community infrastructure: state-sponsored attackers and felony enterprises. “State-sponsored teams are considering these gadgets primarily to achieve a foothold for espionage functions, with the objective to take care of entry for the long run,” Biasini stated. 

Source link

TAGGED: Cisco, infrastructure, Network, postcompromise, tactics, Talos, threaten
Share This Article
Twitter Email Copy Link Print
Previous Article Renesas develops advanced memory technology for microcontrollers Vecow employs latest Intel processors to advance its edge AI solutions
Next Article BIOBOT BIOBOT Closes $24M in Series B Funding
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

The privacy paradox is turning into a data centre weak point

Gerald Beuchelt, CISO at Acronis, argues that the so-called privateness paradox – customers fearing breaches…

November 24, 2025

Photonic computing needs more nonlinearity: Acoustics can help

A schematic illustration of how an optoacoustic activation operate may be employed between layers n…

April 14, 2025

Juniper offers AI pricing incentives, education programs

Juniper’s packages provide entry to quite a lot of incentives, together with: a free entry…

August 26, 2024

Holly Raises $2.2M in Pre-Seed Funding

Holly, a NYC-based supplier of an AI-powered platform modernizing authorities hiring, raised $2.2M in Pre-Seed…

January 10, 2025

Mabylon AG Raises CHF 30M in Funding

Mabylon AG, a Schlieren, Switzerland-based firm which specializes within the discovery, characterization, and growth of…

August 12, 2025

You Might Also Like

Cloud Hyperscaler Concept - Hyperscale Computing - Cloud Architecture that Scales with Increasing Demand - 3D Illustration
Global Market

Neoclouds gain momentum in a supply-constrained world

By saad
Stargate comes to the UK, with OpenAI, Nvidia and Nscale
Global Market

OpenAI puts Stargate UK on pause, cites ‘high energy costs’

By saad
open source digital screen
Global Market

New v2 UALink specification aims to catch up to NVLink

By saad
Could being a ‘good neighbour’ help secure grid access?
Global Market

Could being a ‘good neighbour’ help secure grid access?

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.