Security Experts:

long dotted


Schneider Electric has patched a Wonderware System Platform vulnerability that can be exploited for arbitrary code execution.
Yahoo has patched an SSRF/XSPA vulnerability related to image processing nearly one year after it learned of its existence.
130 people who acquired plane tickets using stolen credit card data have been detained and questioned as part of an international law enforcement operation.
OPM has suspended its background check system after a vulnerability was identified during an audit. The application will be offline for 4-6 weeks.
Hundreds of major organizations are vulnerable to cyberattacks due to security flaws in Oracle PeopleSoft applications, according to ERPScan.
The Fire OS 4.6.1 update released by Amazon for Fire Phone patches at least three security holes.
The recently patched Flash Player flaw used by the Chinese threat group APT3 has now been integrated into the Magnitude exploit kit.
Cisco warned on Thursday that as a result of default encryption keys in three of its security products, customers are at risk of an unauthenticated remote attacker being able intercept traffic or gain access to vulnerable systems with root privileges.
Trend Micro analyzed the recent Adobe Flash Player vulnerability and found the root cause between the zero-day and another flaw was very similar.
Bug bounty platform provider HackerOne announced on Wednesday that it has raised $25 million in a Series B financing round led by New Enterprise Associates (NEA).

FEATURES, INSIGHTS // Vulnerabilities

rss icon

Mark Hatton's picture
Unfortunately, when it comes to security, what you’ve accomplished means very little. It’s all about where the vulnerabilities still exist.
David Holmes's picture
Is it possible to apply this maxim to global SSL patch rates? Let’s take a look at the most recent SSL vulnerability: POODLE.
David Holmes's picture
The media was so taken with the idea that Kate Upton nude photos had caused a DDoS attack that they just took the story and ran with it. But what really caused disrupted service across New Zealand’s major ISPs?
Mark Hatton's picture
Without the ability to prioritize in certain situations, you may end up waiting weeks to apply the most important patch. Think of your corporate network like your home. There are probably lots of items on your honey do list, but they can’t all be completed today.
Torsten George's picture
It appears that 2014 will be remembered in the IT industry for several severe and wide-reaching server-side vulnerabilities. So what lessons can we learn from these vulnerabilities?
Torsten George's picture
To limit the risk of having drive-by malware attacks planted on their websites, organizations should monitor the payload of their different Internet properties, which for larger organizations can easily become a huge undertaking.
Fahmida Y. Rashid's picture
Opinions vary wildly among experts as to the potential impact of the Shellshock vulnerability. What is known—and agreed upon—at this point, is that Shellshock is a very serious vulnerability because it allows remote code execution and gives the attacker full access to the system.
Jason Polancich's picture
Businesses have more data on hand than they think. They key is crafting a plan to track it and combine it with data from outside their own walls against which the internal data can be analyzed.
Torsten George's picture
When an organization is solely focused on strengthening its compliance posture to pass an audit, they primarily look at control failures and gaps and try to mitigate them.
Mark Hatton's picture
You need to identify your security shortcomings before someone else does. Simulate attacks and tests to associate known vulnerabilities, previous attack patterns, and security/network data to identify potential attack paths to your company’s most important data.