top of page
Map_edited.png
Green.png
Yellow.png
Yellow.png
Green.png

Cisco Hack... Nobody Saw It Coming. We Did.

“Hackers have exploited an unpatched zero-day vulnerability in Cisco’s networking software to compromise tens of thousands of devices, researchers have warned. Cisco on Monday issued an advisory warning that a critical-rated vulnerability in IOS XE, the software that powers the company’s range of networking devices, was being actively exploited by hackers. Cisco said the bug was found in the IOS XE web administration interface, which can be exploited when an affected device is exposed to the internet”.


Cisco’s threat intelligence arm Talos said that as-yet-unidentified hackers have been exploiting the bug — known as a zero-day, a type of vulnerability discovered by attackers before the vendor has had time to fix it — since at least September 18. Cisco Talos said that successful exploitation grants an attacker “full control of the compromised device” that allows for “possible subsequent unauthorized activity” on the corporate victim’s network.


And just so you understand how severe this hack is, it affects pretty much all CISCO products: enterprise switches, wireless controllers, access points, aggregation routers, branch routers, industrial routers, virtual routing, converged broadband routers.


It’s kind of like that scene in Moneyball where Billy Beane asks, “if he’s a good hitter, why doesn’t he hit good”? The same thing applies to the legacy solutions in place. “If they could see the bad guys coming, why didn’t they see bad guys coming?”


We did.


The reason we’re able to see what other solutions can’t is how we attack the problem. The Cynamics platform is built on the observation that collecting, processing, and analyzing 100% of traffic in today’s networks is no longer practical, due to exponentially growing network sizes, in terms of data volumes and architecture. CYNAMICS is fundamentally altering the cyber landscape when it comes to threat-prediction, network detection response and AI-driven cyberspace security continuous monitoring. Leveraging patented, proprietary algorithms together with advanced AI and machine learning, Cynamics provides threat prediction and full visibility - at speed and scale. The patented Cynamics Network Blueprint technology utilizes advanced sampling techniques to minimize the resource demand on the network, so only 1% of network traffic provides 100% visibility. No blind spots or latency.


Cynamics delivers a next-generation capability that rapidly detects threats, attacks & anomalies across complex terrestrial, SATCOM & hybrid networks. We identify behaviors associated with next-generation attacks—attacks we’ve never seen before—attacks where no signature even exists. We offer state-of-the-art protection with surgical precision, allowing you to proactively protect the most critical assets across your entire network—not just a piece of it.


Through patented, innovative algorithms and technologies for inferring complete network visibility from the small, collected samples, continuous network learning and threat prediction are optimized. By summarizing the network state in every timestamp and autonomously learning the most important network fields to look at, the Cynamics solution also identifies hidden patterns in the network traffic that precede an attack across an organization’s global network. “We only sample small fractions of the packets, amounting to approximately 1% or even less, and this is sufficient for our technology to infer the complete picture on network traffic and alert on suspicious patterns”.


Even with all the legacy systems in place, comprehensive cyber investment and defensive-in-depth posture, hackers still gained access. Very simply, they exploited blind spots due to a lack of total coverage. Cynamics provides threat prediction and full visibility - at speed and scale. Cynamics’ Network Blueprint technology utilizes advanced sampling techniques to minimize the resource demand on the network, so only 1% of network traffic provides 100% visibility. Unlike these legacy systems, we identify behaviors associated with next-generation attacks. We offer state-of-the-art protection with surgical precision, allowing you to proactively protect the most critical assets across your entire network—not just a piece of it.


Learn how you can use Cynamics to shield against the latest Cisco IOS XE Hack in just 5 minutes in this datasheet.


Opmerkingen


bottom of page