Security Experts:

Virus & Threats
long dotted


Hundreds of terabytes of data exposed on the Internet due to MongoDB configuration issue.
Microsoft released an emergency out-of-band security update on Monday to address a critical vulnerability (CVE-2015-2426) in Windows that could allow a remote attacker to gain complete control of an affected system.
Threat actors believed to be from China have used one of Hacking Team’s Flash Player exploits (CVE-2015-5122) to target Japanese companies.
Georgia Tech researchers discover TCP/IP stack vulnerability affecting Eaton controls and relays. Software updates released to patch the flaw.
One of the Office vulnerabilities patched on Tuesday by Microsoft has been exploited in the wild by the APT group Pawn Storm/APT28/Tsar Team.
DoS vulnerability found in two Cisco Videoscape products. Patches made available only for one of them.
Siemens has patched an authentication bypass vulnerability in SICAM MIC telecontrol devices.
Researchers have demonstrated that RC4 vulnerabilities can be exploited to obtain web cookies in 75 hours and break WPA-TKIP networks in just one hour.
HTML5 can be used to obfuscate exploits used in drive-by download attacks and make them more difficult to detect, say researchers.
Oracle’s July 2015 CPU patches a total of 193 vulnerabilities, including the Java zero-day exploited in the wild by Pawn Storm / APT28.

FEATURES, INSIGHTS // Virus & Threats

rss icon

Jason Polancich's picture
Businesses have more data on hand than they think. They key is crafting a plan to track it and combine it with data from outside their own walls against which the internal data can be analyzed.
Marc Solomon's picture
Malvertising underscores the need for an approach to security that addresses the full attack continuum. With ongoing visibility and control, and intelligent and continuous updates, security professionals can take action to stop the inevitable outbreak.
Torsten George's picture
When an organization is solely focused on strengthening its compliance posture to pass an audit, they primarily look at control failures and gaps and try to mitigate them.
Mark Hatton's picture
You need to identify your security shortcomings before someone else does. Simulate attacks and tests to associate known vulnerabilities, previous attack patterns, and security/network data to identify potential attack paths to your company’s most important data.
Scott Simkin's picture
While SSL decryption is necessary for maintaining network security, security admins need to establish strict rules about how they handle decrypted data.
Ryan Naraine's picture
John Hultquist, Manager of Cyber Espionage Threat Intelligence at ISIGHT Partners, joins the podcast to talk about "NEWSCASTER," a cyber espionage operation that uses fictitious social media accounts to launch attacks.
Danelle Au's picture
The protection of connected ( Internet of Things) devices is likely better performed at a network level rather than an endpoint level due to the variety of devices that may exist and the limited endpoint security functions that can be supported.
Mark Hatton's picture
The fact that you aren’t seeing or hearing about potential threats to the organization, or alarms aren’t being raised by the security team, shouldn’t make you feel better as an executive.
Torsten George's picture
A threat is the agent that takes advantage of a vulnerability. This relationship must be a key factor in the risk assessment process and can no longer be treated as risk’s neglected step child.
Marc Solomon's picture
Many continue to click on links or attachments sent via email without taking any steps to verify the origin of the email or the validity of the link or attachment. It only takes one click to for an attacker to establish a foothold in the target’s systems.