array(3) {
["company_details"]=>
array(13) {
["name"]=>
string(27) "CISCO INTERNATIONAL LIMITED"
["slug"]=>
string(36) "8d023-gb-cisco-international-limited"
["logo"]=>
string(84) "https://images.businessradar.com/linkedin_logos/67b7854f-58f3-47d0-b86d-ae1839283873"
["description"]=>
string(1233) "Cisco (NASDAQ: CSCO) enables people to make powerful connections--whether in business, education, philanthropy, or creativity. Cisco hardware, software, and service offerings are used to create the Internet solutions that make networks possible--providing easy access to information anywhere, at any time.
Cisco was founded in 1984 by a small group of computer scientists from Stanford University. Since the company's inception, Cisco engineers have been leaders in the development of Internet Protocol (IP)-based networking technologies. Today, with more than 71,000 employees worldwide, this tradition of innovation continues with industry-leading products and solutions in the company's core development areas of routing and switching, as well as in advanced technologies such as home networking, IP telephony, optical networking, security, storage area networking, and wireless technology. In addition to its products, Cisco provides a broad range of service offerings, including technical support and advanced services.
Cisco sells its products and services, both directly through its own sales force as well as through its channel partners, to large enterprises, commercial businesses, service providers, and consumers."
["address_street"]=>
string(15) "9-11 New Square"
["address_place"]=>
string(7) "FELTHAM"
["address_region"]=>
NULL
["founding_date"]=>
string(10) "2008-07-08"
["website_domain"]=>
string(9) "cisco.com"
["website_url"]=>
string(21) "https://www.cisco.com"
["industry_codes"]=>
array(2) {
[0]=>
string(29) "Computer Programming Services"
[1]=>
string(51) "Computer Related Services, Not Elsewhere Classified"
}
["employee_count"]=>
int(3061)
["article_count"]=>
int(2036)
}
["articles"]=>
array(9) {
[0]=>
array(7) {
["title_en"]=>
string(54) "Cisco's Duo MFA message logs stolen in phishing attack"
["snippet_en"]=>
string(99) "Also warns of brute force attacks targeting its own VPNs, Check Point, Fortinet, SonicWall and more"
["url"]=>
string(53) "https://www.theregister.com/2024/04/17/cisco_duo_vpn/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/f2713d19-c9bf-4779-8228-4d3abfb034b5"
["source"]=>
string(15) "theregister.com"
["publication_date"]=>
string(10) "2024-04-17"
["categories"]=>
array(2) {
[0]=>
string(15) "Corporate Theft"
[1]=>
string(10) "Cybercrime"
}
}
[1]=>
array(7) {
["title_en"]=>
string(77) "Cisco: Hacker breached multifactor authentication message provider on April 1"
["snippet_en"]=>
string(113) "Cisco said the breach occurred in the system of a telephony supplier that its Duo unit uses to send MFA messages."
["url"]=>
string(68) "https://therecord.media/cisco-duo-data-breach-mfa-telephony-provider"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/8b496994-ae9d-4629-8e3a-232878ea9699"
["source"]=>
string(15) "therecord.media"
["publication_date"]=>
string(10) "2024-04-15"
["categories"]=>
array(2) {
[0]=>
string(10) "Cybercrime"
[1]=>
string(5) "Legal"
}
}
[2]=>
array(7) {
["title_en"]=>
string(39) "Big move for cloud security from Cisco!"
["snippet_en"]=>
string(90) "Cisco announced that it acquired Isovalent. The goal is to strengthen multi-cloud security"
["url"]=>
string(69) "https://www.techinside.com/ciscodan-bulut-guvenligi-icin-buyuk-hamle/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/9042773d-cf2c-41f8-9b02-6694bb7658ac"
["source"]=>
string(14) "techinside.com"
["publication_date"]=>
string(10) "2024-04-13"
["categories"]=>
array(3) {
[0]=>
string(13) "Data Security"
[1]=>
string(11) "Acquisition"
[2]=>
string(10) "Cybercrime"
}
}
[3]=>
array(7) {
["title_en"]=>
string(114) "Summary: Upstream Security Receives Funding from Cisco Investments as Demand for IoT Cybersecurity Solutions Soars"
["snippet_en"]=>
string(139) "Connected vehicles and mobile IoT devices introduce additional layers of cyber risks, creating threats against operational availability and"
["url"]=>
string(177) "https://www.01net.it/riassunto-upstream-security-riceve-un-finanziamento-da-cisco-investments-mentre-aumenta-vertiginosamente-la-richiesta-di-soluzioni-per-la-cybersecurity-iot/"
["image_url"]=>
NULL
["source"]=>
string(8) "01net.it"
["publication_date"]=>
string(10) "2024-04-10"
["categories"]=>
array(2) {
[0]=>
string(13) "Data Security"
[1]=>
string(10) "Cybercrime"
}
}
[4]=>
array(7) {
["title_en"]=>
string(55) "Cisco issues warning about XSS flaw in routers for SMEs"
["snippet_en"]=>
string(262) "Flaw tracked as CVE-2024-20362 by security researchers and exploitable remotely without authentication affects RV016, RV042, RV042G, RV082, RV320, and RV325 series routers for small businesses, which have been discontinued and no longer receive security patches."
["url"]=>
string(90) "https://www.cisoadvisor.com.br/cisco-emite-alerta-sobre-falha-xss-em-roteadores-para-pmes/"
["image_url"]=>
NULL
["source"]=>
string(18) "cisoadvisor.com.br"
["publication_date"]=>
string(10) "2024-04-08"
["categories"]=>
array(1) {
[0]=>
string(10) "Cybercrime"
}
}
[5]=>
array(7) {
["title_en"]=>
string(47) "Organizations barely prepared for cyber attacks"
["snippet_en"]=>
string(97) "Only three percent of organizations in the Netherlands have a good level of protection against it"
["url"]=>
string(90) "https://www.beveiligingswereld.nl/nieuws/organisaties-nauwelijks-voorbereid-op-cyberaanval"
["image_url"]=>
NULL
["source"]=>
string(21) "beveiligingswereld.nl"
["publication_date"]=>
string(10) "2024-04-08"
["categories"]=>
array(2) {
[0]=>
string(13) "Data Security"
[1]=>
string(10) "Cybercrime"
}
}
[6]=>
array(7) {
["title_en"]=>
string(85) "Vietnamese hackers are suspected of being behind financial data theft attacks in Asia"
["snippet_en"]=>
string(110) "Cisco Talos said the hacker group focused on victims' credentials, financial data and social network accounts."
["url"]=>
string(121) "https://quantrimang.com/lang-cong-nghe/hacker-viet-bi-dung-sau-cac-vu-tan-cong-danh-cap-du-lieu-tai-chinh-o-chau-a-202406"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/3797633e-03d3-45b4-b003-d9e824a35333"
["source"]=>
string(15) "quantrimang.com"
["publication_date"]=>
string(10) "2024-04-08"
["categories"]=>
array(2) {
[0]=>
string(13) "Data Security"
[1]=>
string(10) "Cybercrime"
}
}
[7]=>
array(7) {
["title_en"]=>
string(57) "Indian cyber agency finds multiple bugs in Cisco products"
["snippet_en"]=>
string(153) "NEW DELHI — The Indian Computer Emergency Response Team (CERT-In) which comes under the Ministry of Electronics & Information Technology, has issued an"
["url"]=>
string(92) "https://easternmirrornagaland.com/indian-cyber-agency-finds-multiple-bugs-in-cisco-products/"
["image_url"]=>
NULL
["source"]=>
string(25) "easternmirrornagaland.com"
["publication_date"]=>
string(10) "2024-04-02"
["categories"]=>
array(1) {
[0]=>
string(10) "Cybercrime"
}
}
[8]=>
array(7) {
["title_en"]=>
string(90) "Cisco security researchers uncover ArcaneDoor espionage campaign by state-sponsored actors"
["snippet_en"]=>
string(243) "Cisco researchers working with cybersecurity researchers from around the world, have found evidence of sophisticated hacking group backed by a state. This group has been targeting the perimeter devices of companies, with the goal of espionage."
["url"]=>
string(145) "https://www.news9live.com/technology/tech-news/cisco-security-researchers-uncover-arcanedoor-espionage-campaign-by-state-sponsored-actors-2511029"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/8316191d-da8b-4403-9879-1a6f44698a6f"
["source"]=>
string(13) "news9live.com"
["publication_date"]=>
string(10) "2024-04-02"
["categories"]=>
array(3) {
[0]=>
string(21) "Cultural developments"
[1]=>
string(13) "Data Security"
[2]=>
string(10) "Cybercrime"
}
}
}
["category_annotations"]=>
array(30) {
[0]=>
array(2) {
["name"]=>
string(13) "Data Security"
["count"]=>
int(276)
}
[1]=>
array(2) {
["name"]=>
string(13) "Collaboration"
["count"]=>
int(239)
}
[2]=>
array(2) {
["name"]=>
string(10) "Cybercrime"
["count"]=>
int(231)
}
[3]=>
array(2) {
["name"]=>
string(14) "Product Launch"
["count"]=>
int(134)
}
[4]=>
array(2) {
["name"]=>
string(5) "R & D"
["count"]=>
int(98)
}
[5]=>
array(2) {
["name"]=>
string(11) "Acquisition"
["count"]=>
int(89)
}
[6]=>
array(2) {
["name"]=>
string(16) "Customer Privacy"
["count"]=>
int(76)
}
[7]=>
array(2) {
["name"]=>
string(12) "Stock Market"
["count"]=>
int(74)
}
[8]=>
array(2) {
["name"]=>
string(18) "Expansion & Growth"
["count"]=>
int(64)
}
[9]=>
array(2) {
["name"]=>
string(41) "E-commerce and Technological Developments"
["count"]=>
int(58)
}
[10]=>
array(2) {
["name"]=>
string(24) "Quarterly/Annual Figures"
["count"]=>
int(57)
}
[11]=>
array(2) {
["name"]=>
string(15) "Market Movement"
["count"]=>
int(53)
}
[12]=>
array(2) {
["name"]=>
string(25) "Business Model Resilience"
["count"]=>
int(49)
}
[13]=>
array(2) {
["name"]=>
string(20) "Business Development"
["count"]=>
int(48)
}
[14]=>
array(2) {
["name"]=>
string(18) "General Investment"
["count"]=>
int(44)
}
[15]=>
array(2) {
["name"]=>
string(31) "Financial Update/Profit Warning"
["count"]=>
int(43)
}
[16]=>
array(2) {
["name"]=>
string(12) "Board Change"
["count"]=>
int(40)
}
[17]=>
array(2) {
["name"]=>
string(5) "Legal"
["count"]=>
int(40)
}
[18]=>
array(2) {
["name"]=>
string(7) "Layoffs"
["count"]=>
int(36)
}
[19]=>
array(2) {
["name"]=>
string(5) "Event"
["count"]=>
int(36)
}
[20]=>
array(2) {
["name"]=>
string(5) "Award"
["count"]=>
int(32)
}
[21]=>
array(2) {
["name"]=>
string(15) "Deals & Tenders"
["count"]=>
int(30)
}
[22]=>
array(2) {
["name"]=>
string(12) "Staff hiring"
["count"]=>
int(24)
}
[23]=>
array(2) {
["name"]=>
string(19) "Green & Responsible"
["count"]=>
int(23)
}
[24]=>
array(2) {
["name"]=>
string(23) "Supply Chain Management"
["count"]=>
int(22)
}
[25]=>
array(2) {
["name"]=>
string(21) "Competitive Behaviour"
["count"]=>
int(22)
}
[26]=>
array(2) {
["name"]=>
string(17) "Energy Management"
["count"]=>
int(22)
}
[27]=>
array(2) {
["name"]=>
string(17) "Academic Research"
["count"]=>
int(21)
}
[28]=>
array(2) {
["name"]=>
string(11) "Competition"
["count"]=>
int(21)
}
[29]=>
array(2) {
["name"]=>
string(37) "Product Design & Lifecycle Management"
["count"]=>
int(17)
}
}
}
8d023-gb-cisco-international-limited
CISCO INTERNATIONAL LIMITED
Location
Founded
2008-07-08
Website
https://www.cisco.com
Articles
2036 Articles
Category
Computer Programming Services
Computer Related Services, Not Elsewhere Classified
Description
Cisco (NASDAQ: CSCO) enables people to make powerful connections--whether in business, education, philanthropy, or creativity. Cisco hardware, software, and service offerings are used to create the Internet solutions that make networks possible--providing easy access to information anywhere, at any time.
Cisco was founded in 1984 by a small group of computer scientists from Stanford University. Since the company's inception, Cisco engineers have been leaders in the development of Internet Protocol (IP)-based networking technologies. Today, with more than 71,000 employees worldwide, this tradition of innovation continues with industry-leading products and solutions in the company's core development areas of routing and switching, as well as in advanced technologies such as home networking, IP telephony, optical networking, security, storage area networking, and wireless technology. In addition to its products, Cisco provides a broad range of service offerings, including technical support and advanced services.
Cisco sells its products and services, both directly through its own sales force as well as through its channel partners, to large enterprises, commercial businesses, service providers, and consumers.
Flaw tracked as CVE-2024-20362 by security researchers and exploitable remotely without authentication affects RV016, RV042, RV042G, RV082, RV320, and RV325 series routers for small businesses, which have been discontinued and no longer receive security patches.
NEW DELHI — The Indian Computer Emergency Response Team (CERT-In) which comes under the Ministry of Electronics & Information Technology, has issued an
Cisco researchers working with cybersecurity researchers from around the world, have found evidence of sophisticated hacking group backed by a state. This group has been targeting the perimeter devices of companies, with the goal of espionage.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.