<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cisco Systems &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/cisco-systems/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Fri, 29 May 2020 21:03:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Cisco Systems &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Hackers Breached 6 Unpatched Cisco Internal Servers</title>
		<link>https://risk-academy.ru/hackers-breached-6-unpatched-cisco-internal-servers/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 29 May 2020 21:03:40 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Cisco Systems]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Telecommunications]]></category>
		<category><![CDATA[Computer networking]]></category>
		<category><![CDATA[virtual networking service]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[BUYERS GUIDE]]></category>
		<category><![CDATA[Doug Olenick]]></category>
		<category><![CDATA[Patch Management Servers Support Company]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/hackers-breached-6-unpatched-cisco-internal-servers/</guid>

					<description><![CDATA[Governance &#38; Risk Management , IT Risk Management , Patch Management Servers Support Company&#8217;s Virtual Networking Service Doug Olenick (DougOlenick) • May 29, 2020     Six internal servers that [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="generic-article">
<p class="text-muted">
                      Governance &amp; Risk Management<br />
                          ,<br />
                              IT Risk Management<br />
                          ,<br />
                              Patch Management
                          </p>
<p>          <span class="article-sub-title">Servers Support Company&#8217;s Virtual Networking Service</span><br />
        <span class="article-byline"><br />
                        Doug Olenick (<i class="fa fa-twitter"/>DougOlenick)                          •<br />
            <span class="text-nowrap">May 29, 2020</span>     </span></p>
<figure>
        <img decoding="async" title="Computer network security" src="https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/hackers-breached-6-unpatched-cisco-internal-servers-showcase_image-6-a-14357.jpg" alt="Hackers Breached 6 Unpatched Cisco Internal Servers" class="img-responsive "/><br />
              </figure>
<p>Six internal servers that Cisco uses to support its virtual networking service were compromised earlier this month after the company failed to patch two SaltStack zero day vulnerabilities, according to a security advisory sent to customers this week. </p>
<p><b>See Also:</b> Buyers Guide: Third-Party Cyber Risk Management</p>
<p>&#13;</p>
<p>Cisco gave no details on exactly what, if any, damage was done as a result of the&#8230;</p>
</div>
<p><a href="https://www.govinfosecurity.com/hackers-breached-6-unpatched-cisco-internal-servers-a-14357">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
