Telegram Web Link
In Northern Ontario, an empathetic approach to public safety gets a boost from Cisco.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
Сisсо Сhаnnеl pinned «🔥 Today we surpassed 16,000 Subscribers! Awesome! Can we make it to 17,000 in 2 months? If we do, there'll be a Telegram stars giveaway! Note: this is a community ran channel. Not official! 🧠 If you're looking for help check out our group chat! > @CiscoChat»
Forwarded from Сisсо Сhаnnеl
🔥 Today we surpassed 16,000 Subscribers! Awesome!

Can we make it to 17,000 in 2 months? If we do, there'll be a Telegram stars giveaway!

Note: this is a community ran channel. Not official!

🧠 If you're looking for help check out our group chat!
> @CiscoChat
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
Forwarded from Pavel Durov (Paul Du Rove)
🐵 Humans are hardwired to copy others by evolution — for a good reason. Mimicking those around us has been the most efficient survival strategy for millions of years. However, the world is different today. We now live in an age of rapid change — what used to be efficient becomes a recipe for mediocrity and decay ☠️

🥂 Let 2025 be the year we rely on our own opinions — not imposed stereotypes and outdated thought patterns. Only by trusting our instincts and following our own unique paths can we fulfil our potential and make great contributions to the world 🎨

🎆 Have a happy and productive 2025, everyone! 🚩
Please open Telegram to view this post
VIEW IN TELEGRAM
👍8
Forwarded from Network 3A
🤙Cisco community channel and group:
@Cisco
@CiscoChat

💥Other Cisco related Channels and groups:
@ciscoAcademy
@spotociscoclub

Qubes OS Community Channel and group:
@QubesOS
@QubesChat

Off topic chats:
@PublicChatrooms

Games:
@hamstEr_kombat_bot
@CatizenBot
@boinker_bot - addicting


Other Channels:
@telemojis
@TheTGTimes
@TVids - True Videos

▪️▫️▪️▫️▪️▫️▪️▫️▪️▫️▪️
Join @Net3A for more channels and groups.
👍1
A Cisco-sponsored project explores how technology can better support seniors, people with developmental disabilities, and other challenged communities.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
👍1
Cisco Crosswork Network Controller Stored Cross-Site Scripting Vulnerabilities
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco%20Crosswork%20Network%20Controller%20Stored%20Cross-Site%20Scripting%20Vulnerabilities%26vs_k=1

Multiple vulnerabilities in the web-based management interface of Cisco Crosswork Network Controller could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against users of the interface of an affected system.
These vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by inserting malicious data into specific data fields in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid administrative credentials.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU


Security Impact Rating: Medium


CVE: CVE-2025-20123
👍2
Cisco Common Services Platform Collector Cross-Site Scripting Vulnerabilities
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-xss-CDOJZyH?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco%20Common%20Services%20Platform%20Collector%20Cross-Site%20Scripting%20Vulnerabilities%26vs_k=1

Multiple vulnerabilities in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.
These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit these vulnerabilities by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have at least a low-privileged account on an affected device.
There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-xss-CDOJZyH

Security Impact Rating: Medium


CVE: CVE-2025-20166,CVE-2025-20167,CVE-2025-20168
👍1
Cisco ThousandEyes Agent Certificate Validation Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-thousandeyes-cert-pqtJUv9N?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco%20ThousandEyes%20Agent%20Certificate%20Validation%20Vulnerability%26vs_k=1

A vulnerability in certification validation routines of Cisco ThousandEyes Endpoint Agent for macOS and RoomOS could allow an unauthenticated, remote attacker to intercept or manipulate metrics information.
This vulnerability exists because the affected software does not properly validate certificates for hosted metrics services. An on-path attacker could exploit this vulnerability by intercepting network traffic using a crafted certificate. A successful exploit could allow the attacker to masquerade as a trusted host and monitor or change communications between the remote metrics service and the vulnerable client.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-thousandeyes-cert-pqtJUv9N

Security Impact Rating: Medium


CVE: CVE-2025-20126
👍1
10 𝗕𝗲𝘀𝘁 𝗙𝗥𝗘𝗘 𝗢𝗻𝗹𝗶𝗻𝗲 IT 𝗖𝗼𝘂𝗿𝘀𝗲𝘀 𝘁𝗼 𝗗𝗼 𝗜𝗻 𝟮𝟬𝟮𝟱😍

 Kickstart 2025 with these 10 + free courses that can elevate your skills and open doors to new opportunities! #Cisco, #AWS, #PMP, #Python, #Excel, #Google, #Microsoft

The best part? They’re absolutely free! Invest in yourself and make 2025 your most productive year yet.

𝗟𝗶𝗻𝗸 👇:- https://bit.ly/3PqKVXB
 
Enroll For FREE & Get Certified 🎓

*📚Download 100% real Cisco Exam Dump& study guide: https://bit.ly/3DR0chS

↙️Join 2024 Cisco study Group:
https://chat.whatsapp.com/BX4ZpXvwvSW4Gv10lN9vux
👍1
In a world full of disruption, resilience has never been more important.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
👍1
2025/07/12 04:27:09
Back to Top
HTML Embed Code: