{"id":46462,"date":"2022-05-03T20:02:00","date_gmt":"2022-05-03T20:02:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/cisco-urges-software-update-to-thwart-counterfeit-switches\/"},"modified":"2022-05-03T20:02:00","modified_gmt":"2022-05-03T20:02:00","slug":"cisco-urges-software-update-to-thwart-counterfeit-switches","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cisco-urges-software-update-to-thwart-counterfeit-switches\/","title":{"rendered":"Cisco urges software update to thwart counterfeit switches"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/10\/cso_a_binary_mask_identity_artificial_intelligence_deepfakes_fraud_by_brownmantis_cc0_via_pixabay_1200x800-100812618-large.jpg?auto=webp&amp;quality=85,70\" class=\"ff-og-image-inserted\"><\/div>\n<p>Cisco is encouraging users of its popular Catalyst 2960X\/2960XR switches to upgrade their IOS operating systems in an effort to combat counterfeiting.<\/p>\n<p>Because of the pervasiveness of these switches on the gray market, it\u2019s imperative that customers enable the latest software release \u2013 IOS release 15.2(7)E4 or later \u2013 to validate the authenticity, security, and performance of their Catalyst <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/switches\/catalyst-2960-x-series-switches\/datasheet_c78-728232.html\" rel=\"nofollow\">2960X\/2960XR<\/a> 24\/48 port Gigabit Ethernet switches, Cisco stated in a <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/field-notices\/723\/fn72399.html\" rel=\"nofollow\">notice to customers<\/a>.&nbsp;<\/p>\n<aside class=\"fakesidebar fakesidebar-auto sidebar\">\n<p><strong> Read more: <\/strong><a href=\"https:\/\/www.networkworld.com\/article\/3637965\/how-to-choose-an-edge-gateway.html\">How to choose an edge gateway<\/a><\/p>\n<\/aside>\n<p>Cisco uses a combination of security products \u2013 such as its Hardware Trust Anchor, Secure Unique Device Identifier (SUDI), digitally signed software images, and secure boot \u2013 to verify the authenticity of its equipment. These technologies run automated checks of hardware and software integrity and can shut down the boot process if a compromise is detected. The newer IOS includes this SUDI verification process and is based on public key infrastructure (PKI) and associated cryptography, Cisco stated.&nbsp;<\/p>\n<p>The counterfeit warning comes as Cisco says it has seen an increase in gray market and <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/about\/legal\/brand-protection\/identify-counterfeit-products.html?dtid=oblgzzz000659\" rel=\"nofollow\">counterfeit<\/a> activity, likely due to industry-wide supply chain issues, according to Al Palladin, Cisco\u2019s brand protection chief.&nbsp; &nbsp;<\/p>\n<p>\u201cMaterial shortages across the semiconductor industry, as well as logistics challenges, continue to impact supply chains globally, slowing output across multiple industries,\u201d Palladin wrote in a recent <a href=\"https:\/\/blogs.cisco.com\/partner\/avoid-potential-risks-while-navigating-lead-times\" rel=\"nofollow\">blog<\/a>. \u201cThis has resulted in extended lead-times across almost all products, and extended delivery dates.\u201d<\/p>\n<p>\u201cProducts sourced from outside Cisco\u2019s authorized channels may not come with a valid Cisco warranty and license,\u201d Palladin stated.&nbsp;\u201cIn addition, they may pass through many hands before they are delivered to you, making it possible that equipment and software have been altered to make them vulnerable to attack or premature failure.\u201d<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>Supply chain issues are causing a backlog of orders across the networking industry. Arista stated earlier this year that some of the lead times on its sales are 50-70 weeks out.&nbsp;Cisco, in its most recent disclosure, said its <a href=\"https:\/\/www.networkworld.com\/article\/3650469\/cisco-faces-a-14b-backlog-thanks-to-component-scarcity.html\">current product backlog<\/a> is nearly $14 billion.&nbsp;Juniper has reported more than $1.8 billion in backlog orders, and Extreme Networks <a href=\"https:\/\/www.networkworld.com\/article\/3658950\/extreme-networks-supply-chain-woes-backlogs-higher-prices.html\">said its total backlog<\/a> is $425 million.<\/p>\n<p>In addition to the counterfeit-related notice, Cisco has announced <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/switches\/catalyst-2960-x-series-switches\/eos-eol-notice-c51-744432.html\" rel=\"nofollow\">end-of-life<\/a> dates for the Catalyst 2960X product family. The last day to order 2690X products is October 31, 2022. Customers should look to migrate to newer models such as the Catalyst 9200 family, Cisco stated.&nbsp;Customers may be able to use the Cisco <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/partners\/incentives\/deal-registration.html\" rel=\"nofollow\">Technology Migration Program<\/a> (TMP) where applicable, the vendor stated. &nbsp;&nbsp;<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<div class=\"end-note\"> <!-- blx4 #2005 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\" rel=\"noopener\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a> to comment on topics that are top of mind. <\/div>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3658918\/cisco-urges-software-update-to-thwart-counterfeit-switches.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nCisco is encouraging users of its popular Catalyst 2960X\/2960XR switches to upgrade their IOS operating systems in an effort to combat counterfeiting.Because of the pervasiveness of these switches on the gray market, it\u2019s imperative that customers enable the latest software release \u2013 IOS release 15.2(7)E4 or later \u2013 to validate the authenticity, security, and performance of their Catalyst 2960X\/2960XR 24\/48 port Gigabit Ethernet switches, Cisco stated in a notice to customers.\u00a0To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":46463,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[539,9984,1061,762],"class_list":["post-46462","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-cisco-systems","tag-juniper-networks","tag-network-security","tag-networking"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cisco urges software update to thwart counterfeit switches 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cisco-urges-software-update-to-thwart-counterfeit-switches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cisco urges software update to thwart counterfeit switches 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cisco-urges-software-update-to-thwart-counterfeit-switches\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-03T20:02:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.idgesg.net\/images\/article\/2019\/10\/cso_a_binary_mask_identity_artificial_intelligence_deepfakes_fraud_by_brownmantis_cc0_via_pixabay_1200x800-100812618-large.jpg?auto=webp&amp;quality=85,70\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-urges-software-update-to-thwart-counterfeit-switches\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-urges-software-update-to-thwart-counterfeit-switches\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cisco urges software update to thwart counterfeit switches\",\"datePublished\":\"2022-05-03T20:02:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-urges-software-update-to-thwart-counterfeit-switches\\\/\"},\"wordCount\":444,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-urges-software-update-to-thwart-counterfeit-switches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cisco-urges-software-update-to-thwart-counterfeit-switches.jpg\",\"keywords\":[\"Cisco systems\",\"Juniper Networks\",\"Network Security\",\"Networking\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-urges-software-update-to-thwart-counterfeit-switches\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-urges-software-update-to-thwart-counterfeit-switches\\\/\",\"name\":\"Cisco urges software update to thwart counterfeit switches 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-urges-software-update-to-thwart-counterfeit-switches\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-urges-software-update-to-thwart-counterfeit-switches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cisco-urges-software-update-to-thwart-counterfeit-switches.jpg\",\"datePublished\":\"2022-05-03T20:02:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-urges-software-update-to-thwart-counterfeit-switches\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-urges-software-update-to-thwart-counterfeit-switches\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-urges-software-update-to-thwart-counterfeit-switches\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cisco-urges-software-update-to-thwart-counterfeit-switches.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cisco-urges-software-update-to-thwart-counterfeit-switches.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisco-urges-software-update-to-thwart-counterfeit-switches\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cisco systems\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cisco-systems\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cisco urges software update to thwart counterfeit switches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cisco urges software update to thwart counterfeit switches 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cisco-urges-software-update-to-thwart-counterfeit-switches\/","og_locale":"en_US","og_type":"article","og_title":"Cisco urges software update to thwart counterfeit switches 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cisco-urges-software-update-to-thwart-counterfeit-switches\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-05-03T20:02:00+00:00","og_image":[{"url":"https:\/\/images.idgesg.net\/images\/article\/2019\/10\/cso_a_binary_mask_identity_artificial_intelligence_deepfakes_fraud_by_brownmantis_cc0_via_pixabay_1200x800-100812618-large.jpg?auto=webp&amp;quality=85,70","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cisco-urges-software-update-to-thwart-counterfeit-switches\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-urges-software-update-to-thwart-counterfeit-switches\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cisco urges software update to thwart counterfeit switches","datePublished":"2022-05-03T20:02:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-urges-software-update-to-thwart-counterfeit-switches\/"},"wordCount":444,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-urges-software-update-to-thwart-counterfeit-switches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/cisco-urges-software-update-to-thwart-counterfeit-switches.jpg","keywords":["Cisco systems","Juniper Networks","Network Security","Networking"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cisco-urges-software-update-to-thwart-counterfeit-switches\/","url":"https:\/\/www.threatshub.org\/blog\/cisco-urges-software-update-to-thwart-counterfeit-switches\/","name":"Cisco urges software update to thwart counterfeit switches 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-urges-software-update-to-thwart-counterfeit-switches\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-urges-software-update-to-thwart-counterfeit-switches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/cisco-urges-software-update-to-thwart-counterfeit-switches.jpg","datePublished":"2022-05-03T20:02:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-urges-software-update-to-thwart-counterfeit-switches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cisco-urges-software-update-to-thwart-counterfeit-switches\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cisco-urges-software-update-to-thwart-counterfeit-switches\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/cisco-urges-software-update-to-thwart-counterfeit-switches.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/cisco-urges-software-update-to-thwart-counterfeit-switches.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cisco-urges-software-update-to-thwart-counterfeit-switches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cisco systems","item":"https:\/\/www.threatshub.org\/blog\/tag\/cisco-systems\/"},{"@type":"ListItem","position":3,"name":"Cisco urges software update to thwart counterfeit switches"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46462","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46462"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46462\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/46463"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46462"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46462"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46462"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}