Jio Platforms Limited, in collaboration with AMD, Cisco, and Nokia, is developing an Open Telecom AI Platform that integrates cutting-edge AI technologies, including various forms of AI and machine learning, to enhance telecom operations by improving network security and efficiency while reducing total cost of ownership.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
Cisco Webex for BroadWorks Credential Exposure Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-credexp-xMN85y6?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco%20Webex%20for%20BroadWorks%20Credential%20Exposure%20Vulnerability%26vs_k=1
A low-severity vulnerability in Cisco Webex for BroadWorks Release 45.2 could allow an unauthenticated, remote attacker to access data and credentials if unsecure transport is configured for the SIP communication.
This vulnerability is due to the exposure of sensitive information in the SIP headers.
A related issue could allow an authenticated user to access credentials in plain text in the client and server logs.
A malicious actor could exploit this vulnerability and the related issue to access data and credentials and impersonate the user.
A configuration change to fix this vulnerability and the related issue has been pushed to Cisco Webex for BroadWorks. Cisco recommends that customers restart their Cisco Webex application to apply the configuration changes.
There is a workaround that addresses this vulnerability and the related issue.
This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-credexp-xMN85y6
Security Impact Rating: Informational
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-credexp-xMN85y6?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco%20Webex%20for%20BroadWorks%20Credential%20Exposure%20Vulnerability%26vs_k=1
A low-severity vulnerability in Cisco Webex for BroadWorks Release 45.2 could allow an unauthenticated, remote attacker to access data and credentials if unsecure transport is configured for the SIP communication.
This vulnerability is due to the exposure of sensitive information in the SIP headers.
A related issue could allow an authenticated user to access credentials in plain text in the client and server logs.
A malicious actor could exploit this vulnerability and the related issue to access data and credentials and impersonate the user.
A configuration change to fix this vulnerability and the related issue has been pushed to Cisco Webex for BroadWorks. Cisco recommends that customers restart their Cisco Webex application to apply the configuration changes.
There is a workaround that addresses this vulnerability and the related issue.
This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-credexp-xMN85y6
Security Impact Rating: Informational
This media is not supported in your browser
VIEW IN TELEGRAM
Ukraine military forcing men to fight in the war by kidnapping them in broad daylight.
This media is not supported in your browser
VIEW IN TELEGRAM
Ukraine military forcing men to fight in the war by kidnapping them in broad daylight.
Samsoe Samsoe: innovating fashion retail with Cisco technology
https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/samsoe-samsoe-innovating-fashion-retail-with-cisco-technology.html?source=rss
https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/samsoe-samsoe-innovating-fashion-retail-with-cisco-technology.html?source=rss
Samsoe Samsoe is redefining retail by seamlessly integrating tradition with technology, transforming the shopping experience.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
Cisco Secure Client for Windows with Secure Firewall Posture Engine DLL Hijacking Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secure-dll-injection-AOyzEqSg?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco%20Secure%20Client%20for%20Windows%20with%20Secure%20Firewall%20Posture%20Engine%20DLL%20Hijacking%20Vulnerability%26vs_k=1
A vulnerability in the interprocess communication (IPC) channel of Cisco Secure Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected device if the Secure Firewall Posture Engine, formerly HostScan, is installed on Cisco Secure Client.
This vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by sending a crafted IPC message to a specific Cisco Secure Client process. A successful exploit could allow the attacker to execute arbitrary code on the affected machine with SYSTEM privileges. To exploit this vulnerability, the attacker must have valid user credentials on the Windows system.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secure-dll-injection-AOyzEqSg
Security Impact Rating: High
CVE: CVE-2025-20206
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secure-dll-injection-AOyzEqSg?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco%20Secure%20Client%20for%20Windows%20with%20Secure%20Firewall%20Posture%20Engine%20DLL%20Hijacking%20Vulnerability%26vs_k=1
A vulnerability in the interprocess communication (IPC) channel of Cisco Secure Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected device if the Secure Firewall Posture Engine, formerly HostScan, is installed on Cisco Secure Client.
This vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by sending a crafted IPC message to a specific Cisco Secure Client process. A successful exploit could allow the attacker to execute arbitrary code on the affected machine with SYSTEM privileges. To exploit this vulnerability, the attacker must have valid user credentials on the Windows system.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secure-dll-injection-AOyzEqSg
Security Impact Rating: High
CVE: CVE-2025-20206
Cisco TelePresence Management Suite Cross-Site Scripting Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tms-xss-vuln-WbTcYwxG?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco%20TelePresence%20Management%20Suite%20Cross-Site%20Scripting%20Vulnerability%26vs_k=1
A vulnerability in the web-based management interface of Cisco TelePresence Management Suite (TMS) could allow a low-privileged, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious data in a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tms-xss-vuln-WbTcYwxG
Security Impact Rating: Medium
CVE: CVE-2025-20208
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tms-xss-vuln-WbTcYwxG?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco%20TelePresence%20Management%20Suite%20Cross-Site%20Scripting%20Vulnerability%26vs_k=1
A vulnerability in the web-based management interface of Cisco TelePresence Management Suite (TMS) could allow a low-privileged, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious data in a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tms-xss-vuln-WbTcYwxG
Security Impact Rating: Medium
CVE: CVE-2025-20208
Building AI-ready service providers
https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/building-ai-ready-service-providers.html?source=rss
https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/building-ai-ready-service-providers.html?source=rss
In a panel discussion at Mobile World Congress, experts explore the rich opportunities and deep challenges of AI in the telco space.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
Cisco Capital Recognized as a Best Company in Monitor Daily 2025 for Financial Innovation
https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/cisco-capital-recognized-as-a-best-company-in-monitor-daily-2025-for-financial-innovation.html?source=rss
https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/cisco-capital-recognized-as-a-best-company-in-monitor-daily-2025-for-financial-innovation.html?source=rss
This recognition underscores Cisco’s pioneering approach to payment solutions, sustainability initiatives and financial flexibility for businesses worldwide.
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html (https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss)
[FREE Study Materials]Pass Your Cisco CCNA/CCNP/CCDE/CCIE Exam with SPOTO Dumps & Exam Service Now🏆
What we set apart:
✅100% Hot IT Certs Real Exam #Dumps
✅ Flexible, on-demand online training
✅ Hands-on Exercises
✅ 7/24 Tutor support
Study efficiently with all of the courses needed for your Cisco #certification exams.
*📚Download FREE Cisco Ebook & official guide: https://bit.ly/3DR0chS
🎉Enroll SPOTO 💯100% Pass #Cisco Dumps & Free Test:
https://bit.ly/40VjRVK
🔗Try Free CCNA 200-301 Training Courses:
https://bit.ly/3vF5idk
✨Connect with 2024 Cisco study Group:
https://chat.whatsapp.com/BX4ZpXvwvSW4Gv10lN9vux
📥☎️Contact Admin @spotolucy * for 100% real Cisco Exam Dump& study guide: https://wa.link/r04o3j
What we set apart:
✅100% Hot IT Certs Real Exam #Dumps
✅ Flexible, on-demand online training
✅ Hands-on Exercises
✅ 7/24 Tutor support
Study efficiently with all of the courses needed for your Cisco #certification exams.
*📚Download FREE Cisco Ebook & official guide: https://bit.ly/3DR0chS
🎉Enroll SPOTO 💯100% Pass #Cisco Dumps & Free Test:
https://bit.ly/40VjRVK
🔗Try Free CCNA 200-301 Training Courses:
https://bit.ly/3vF5idk
✨Connect with 2024 Cisco study Group:
https://chat.whatsapp.com/BX4ZpXvwvSW4Gv10lN9vux
📥☎️Contact Admin @spotolucy * for 100% real Cisco Exam Dump& study guide: https://wa.link/r04o3j
Forwarded from Network 3A
🤙Cisco community channel and group:
@Cisco
@CiscoChat
💥Other Cisco related Channels and groups:
@ciscoAcademy
@spotociscoclub
Qubes OS Community Channel and group:
@QubesOS
@QubesChat
Off topic chats:
@PublicChatrooms
Games:
@hamstEr_kombat_bot
@CatizenBot
@boinker_bot - addicting
Other Channels:
@telemojis
@TheTGTimes
@TVids - True Videos
▪️▫️▪️▫️▪️▫️▪️▫️▪️▫️▪️
Join @Net3A for more channels and groups.
@Cisco
@CiscoChat
💥Other Cisco related Channels and groups:
@ciscoAcademy
@spotociscoclub
Qubes OS Community Channel and group:
@QubesOS
@QubesChat
Off topic chats:
@PublicChatrooms
Games:
@hamstEr_kombat_bot
@CatizenBot
@boinker_bot - addicting
Other Channels:
@telemojis
@TheTGTimes
@TVids - True Videos
▪️▫️▪️▫️▪️▫️▪️▫️▪️▫️▪️
Join @Net3A for more channels and groups.