Tuesday, 16 Dec 2025
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > Cisco Talos: 3 post-compromise tactics that threaten your network infrastructure
Global Market

Cisco Talos: 3 post-compromise tactics that threaten your network infrastructure

Last updated: March 9, 2024 1:23 am
Published March 9, 2024
Share
corporate security insider threat hacker spy cybersecurity human resources
SHARE

The unhealthy actors who’re perpetrating superior persistent menace (APT) assaults aren’t simply seeking to entry your community. They wish to sneak in and dangle round to gather beneficial information or lay plans for future assaults.

Publish-compromise threats are rising, and so they’re aimed largely at getting old community infrastructure and edge gadgets which might be long gone end-of-life stage and will have essential unpatched vulnerabilities, in keeping with Nick Biasini, head of outreach at Cisco’s Talos safety analysis arm. “We do see these threats throughout the board. However the older legacy elements have extra avenues for entry, particularly if the gadgets are out of help and so they haven’t been up to date in three or 4 years,” Biasini stated. 

For a very long time, enterprises have taken a hands-off strategy to edge gadgets, type of a “don’t contact it, let it do what it does, and let it maintain operating” strategy, Biasini stated. “It was like a badge of honor to have an edge machine that was on the market operating for 2 or three years. Now, that may be a very, very large legal responsibility, and it’s one thing organizations really want to deal with,” Biasini stated. 

“There’s going to be a number of extra vulnerabilities and potential avenues for adversaries on these gadgets,” Biasini stated, whereas with just lately put in edge gadgets which have up-to-date firmware, the assault floor goes to be decrease. “We do are inclined to see unhealthy actors feasting on these older gadgets,” he stated.

When older gadgets weren’t designed with safety in thoughts, and when community infrastructure sits exterior of safety’s ecosystem, it makes it more and more troublesome to watch community entry makes an attempt, in keeping with Hazel Burton, a world cybersecurity product advertising and marketing supervisor at Cisco. “Adversaries, notably APTs, are capitalizing on this state of affairs to conduct hidden, post-compromise actions as soon as they’ve gained preliminary entry to the community,” Burton wrote in an a blog outlining some of the attack scenarios. “The objective right here is to provide themselves a better foothold, conceal their actions, and hunt for information and intelligence that may help them with their espionage and/or disruptive targets.”

See also  Digital Realty and EXA Infrastructure partner

Biasini stated there are two foremost teams of unhealthy actors which might be focusing on community infrastructure: state-sponsored attackers and felony enterprises. “State-sponsored teams are considering these gadgets primarily to achieve a foothold for espionage functions, with the objective to take care of entry for the long run,” Biasini stated. 

Source link

TAGGED: Cisco, infrastructure, Network, postcompromise, tactics, Talos, threaten
Share This Article
Twitter Email Copy Link Print
Previous Article Renesas develops advanced memory technology for microcontrollers Vecow employs latest Intel processors to advance its edge AI solutions
Next Article BIOBOT BIOBOT Closes $24M in Series B Funding
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Tencent releases versatile open-source Hunyuan AI models

Tencent has expanded its household of open-source Hunyuan AI fashions which are versatile sufficient for…

August 4, 2025

Conveyor Raises $20M Series B Funding

Conveyor, a San Francisco, CA-based firm which makes a speciality of AI Brokers for B2B…

June 15, 2025

Liquid metal microdroplets enable soft, flexible electric connections across and through circuit layers

This tender circuit has two completely different layers, a prime layer with 9 LEDs and…

October 27, 2024

Is an AI Bubble Inevitable? | DCN

Is the AI business headed towards "irrational exuberance?" That is the phrase then-Federal Reserve Board…

May 13, 2024

Pulsant optimises Reading SE3 data centre connectivity to drive regional AI ambitions

Digital infrastructure chief Pulsant right now introduced upgrades to its Studying SE3 information centre community…

March 20, 2025

You Might Also Like

Drax outlines 100MW data centre plan at Selby power station
Global Market

Drax outlines 100MW data centre plan at Selby power station

By saad
Is the data centre ‘skills gap’ the wrong question?
Global Market

Is the data centre ‘skills gap’ the wrong question?

By saad
3D Rendering of digital binary data on microchip with glow circuit board background. Concept of for deep machine learning, crypto currency, hi tech product uses. Big data visualization, cpu processing
Global Market

How can Arm gain enterprise acceptance?

By saad
Two futuristic-looking hands shaking.
Global Market

Most significant networking acquisitions of 2025

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.