By Johannes Ullrich How to Use Powershell to Make Nessus Reports Usefull
https://isc.sans.edu/forums/diary/Nessus+and+Powershell+is+like+Chocolate+and+Peanut+Butter/20431/
3G/4G Modem Vulnerability Roundup
http://blog.ptsecurity.com/2015/12/critical-vulnerabilities-in-3g4g-modems.html
Exfiltrating Data Using ICMP Echo Requests
http://blog.safebreach.com/2015/12/02/i-see-your-true-echo_request-patterns-pinging-data-away/
Cisco Webex Patches
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151201-wmc More Here