Dev Stahlkopf, Cisco’s chief legal officer, on key results from the company’s latest Data Privacy Benchmark Study.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
Cisco’s 2025 Data Privacy Benchmark Study: Privacy landscape grows increasingly complex in the age of AI
https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/cisco-2025-data-privacy-benchmark-study-privacy-landscape-grows-increasingly-complex-in-the-age-of-ai.html?source=rss
https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/cisco-2025-data-privacy-benchmark-study-privacy-landscape-grows-increasingly-complex-in-the-age-of-ai.html?source=rss
As data privacy remains critical to establishing business value and trust, the study uncovers a complex landscape where the demand for local data storage intersects with reliance on global providers’ expertise.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
Cisco Enterprise Chat and Email Denial of Service Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-dos-tC6m9GZ8?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco%20Enterprise%20Chat%20and%20Email%20Denial%20of%20Service%20Vulnerability%26vs_k=1
A vulnerability in chat messaging features of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
This vulnerability is due to improper validation of user-supplied input to chat entry points. An attacker could exploit this vulnerability by sending malicious requests to a messaging chat entry point in the affected application. A successful exploit could allow the attacker to cause the application to stop responding, resulting in a DoS condition. The application may not recover on its own and may need an administrator to manually restart services to recover.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-dos-tC6m9GZ8
Security Impact Rating: High
CVE: CVE-2025-20139
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-dos-tC6m9GZ8?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco%20Enterprise%20Chat%20and%20Email%20Denial%20of%20Service%20Vulnerability%26vs_k=1
A vulnerability in chat messaging features of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
This vulnerability is due to improper validation of user-supplied input to chat entry points. An attacker could exploit this vulnerability by sending malicious requests to a messaging chat entry point in the affected application. A successful exploit could allow the attacker to cause the application to stop responding, resulting in a DoS condition. The application may not recover on its own and may need an administrator to manually restart services to recover.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-dos-tC6m9GZ8
Security Impact Rating: High
CVE: CVE-2025-20139
Cisco Meraki MX and Z Series AnyConnect VPN Denial of Service Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-vNRpDvfb?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco%20Meraki%20MX%20and%20Z%20Series%20AnyConnect%20VPN%20Denial%20of%20Service%20Vulnerability%26vs_k=1
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series devices could allow an authenticated, remote attacker to cause a denial of service (DoS) condition in the Cisco AnyConnect service on an affected device. To exploit this vulnerability, the attacker must have valid VPN user credentials on the affected device.
This vulnerability exists because a variable is not initialized when an SSL VPN session is established. An attacker could exploit this vulnerability by supplying crafted attributes while establishing an SSL VPN session with an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN sessions and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established.
Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers without manual intervention.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-vNRpDvfb
Security Impact Rating: High
CVE: CVE-2025-20212
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-vNRpDvfb?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco%20Meraki%20MX%20and%20Z%20Series%20AnyConnect%20VPN%20Denial%20of%20Service%20Vulnerability%26vs_k=1
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series devices could allow an authenticated, remote attacker to cause a denial of service (DoS) condition in the Cisco AnyConnect service on an affected device. To exploit this vulnerability, the attacker must have valid VPN user credentials on the affected device.
This vulnerability exists because a variable is not initialized when an SSL VPN session is established. An attacker could exploit this vulnerability by supplying crafted attributes while establishing an SSL VPN session with an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN sessions and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established.
Note: When the attack traffic stops, the Cisco AnyConnect VPN server recovers without manual intervention.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-vNRpDvfb
Security Impact Rating: High
CVE: CVE-2025-20212
Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerabilities
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnmpi-sxss-GSScPGY4?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco%20Evolved%20Programmable%20Network%20Manager%20and%20Cisco%20Prime%20Infrastructure%20Stored%20Cross-Site%20Scripting%20Vulnerabilities%26vs_k=1
Multiple vulnerabilities in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow a remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected system.
For more information about these vulnerabilities, see the Details (https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnmpi-sxss-GSScPGY4?vs_f=Cisco Security Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerabilities%26vs_k=1#details) section of this advisory.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnmpi-sxss-GSScPGY4
Security Impact Rating: Medium
CVE: CVE-2025-20120,CVE-2025-20203
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnmpi-sxss-GSScPGY4?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco%20Evolved%20Programmable%20Network%20Manager%20and%20Cisco%20Prime%20Infrastructure%20Stored%20Cross-Site%20Scripting%20Vulnerabilities%26vs_k=1
Multiple vulnerabilities in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow a remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected system.
For more information about these vulnerabilities, see the Details (https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnmpi-sxss-GSScPGY4?vs_f=Cisco Security Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerabilities%26vs_k=1#details) section of this advisory.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnmpi-sxss-GSScPGY4
Security Impact Rating: Medium
CVE: CVE-2025-20120,CVE-2025-20203
The human behind the login: Janelle Allen’s pursuit of better identity systems
https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/the-human-behind-the-login-janelle-allen-pursuit-of-better-identity-systems.html?source=rss
https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/the-human-behind-the-login-janelle-allen-pursuit-of-better-identity-systems.html?source=rss
On Identity Management Day, we spotlight a leader transforming authentication from rigid password checks to systems that recognize the full complexity of human users.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
Talking creativity, AI, and the future of IT with Fletcher Previn
https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/talking-creativity-ai-and-the-future-of-it-with-fletcher-previn.html?source=rss
https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/talking-creativity-ai-and-the-future-of-it-with-fletcher-previn.html?source=rss
AB interviews Cisco's CIO, Fletcher Previn, on IT's role in business success, future skills, AI enhancing potential, and creativity driving better IT outcomes.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
Boost your IT career with SPOTO's Cisco certification resources! 🚀
💰Cisco certifications can boost your salary by up to 17.8%, adding around $10,600 on average. Gain credibility, unlock promotions, and access top IT jobs.
Kickstart your certification journey with SPOTO 🎯
📚 💯 Real Exam Dumps: Stay current with updated CCNA/CCNP/CCIE materials.
💻 On-Demand Training: Flexible courses with hands-on exercises.
🕒 24/7 Tutor Support: Get help whenever you need it.
Free Resources:
- 📖 Cisco E-books & Guides: https://bit.ly/3DR0chS
🎓 Access FREE CCNA Course: https://bit.ly/3vF5idk
🔗Enroll SPOTO 💯100% Pass #Cisco Dumps & Free Test:
https://bit.ly/40VjRVK
☎️Contact Admin @spotolucy * for 100% real Cisco Exam Dump& study guide:
https://wa.link/r04o3j
💰Cisco certifications can boost your salary by up to 17.8%, adding around $10,600 on average. Gain credibility, unlock promotions, and access top IT jobs.
Kickstart your certification journey with SPOTO 🎯
📚 💯 Real Exam Dumps: Stay current with updated CCNA/CCNP/CCIE materials.
💻 On-Demand Training: Flexible courses with hands-on exercises.
🕒 24/7 Tutor Support: Get help whenever you need it.
Free Resources:
- 📖 Cisco E-books & Guides: https://bit.ly/3DR0chS
🎓 Access FREE CCNA Course: https://bit.ly/3vF5idk
🔗Enroll SPOTO 💯100% Pass #Cisco Dumps & Free Test:
https://bit.ly/40VjRVK
☎️Contact Admin @spotolucy * for 100% real Cisco Exam Dump& study guide:
https://wa.link/r04o3j
Saving endangered species, one network at a time
https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/saving-endangered-species-one-network-at-a-time.html?source=rss
https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/saving-endangered-species-one-network-at-a-time.html?source=rss
Rhinos, elephants, gorillas, and their habitats, are among the natural treasures protected by Cisco and Connected Conservation Foundation in a 10-year partnership.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
Oliver Tuszik joins Cisco’s Executive Leadership Team as EVP, Global Sales
https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/oliver-tuszik-joins-cisco-executive-leadership-team-as-evp-global-sales.html?source=rss
https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/oliver-tuszik-joins-cisco-executive-leadership-team-as-evp-global-sales.html?source=rss