Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

Microsoft has released an update for the Microsoft Malware Protection Engine (MPE) to address a critical severity remote code execution (RCE) vulnerability that could allow an attacker to take control over a vulnerable system. [Read More]
Rockwell Automation patches high severity DoS vulnerability in FactoryTalk Alarms and Events (FTAE) product [Read More]
Organizations are getting better at detecting breaches, but attackers are also working on improving their tactics and techniques [Read More]
OpenSSL 1.0.2n patches two vulnerabilities discovered by a Google researcher using the OSS-Fuzz fuzzing service [Read More]
Iranian cyber espionage group tracked as OilRig and APT34 has been exploiting the recently patched Equation Editor vulnerability in Office to deliver malware [Read More]
Google is boosting the security of its popular web browser with the release of Chrome 63, which brings a host of enhancements aimed at enterprises and also addresses 37 vulnerabilities. [Read More]
Researchers devise new method, dubbed Process Doppelgänging, that can be leveraged by malware to evade security solutions [Read More]
Apple this week released security updates for macOS, watchOS, and tvOS, as well as updated versions of the Safari browser and the iTunes for Windows application. [Read More]
Many industrial products from Siemens are vulnerable to remote DoS attacks. Hundreds of potentially affected devices connected to the Internet [Read More]
Researchers show how hackers can stealthily exfiltrate data from air-gapped industrial networks by manipulating the RF signals emitted by a PLC [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Marie Hattar's picture
When done successfully, continuous testing and training prevents bugs and performance issues from going out the door, while enabling developers to better spot problems in the future.
Jack Danahy's picture
It seems as though competing vendors spend more of their marketing dollars describing the insufficiency of existing solutions than they do explaining the added value that their new advancements bring.
Travis Greene's picture
To reduce exposure to malware, security teams need to learn the DevOps techniques that are being adopted across the rest of the IT organization.
Jim Ivers's picture
Medical devices are indeed vulnerable to attack, but the industry is waking up to the breadth of the problems, and several organizations are forming a vanguard to show the way forward.
Jennifer Blatnik's picture
If the WannaCry incident taught us anything, it’s that global, widespread ransomware can and will impact organizations without any notice. The time to prepare is now.
Torsten George's picture
Hackers are exploiting known vulnerabilities and are betting on the fact that organizations don’t know how to fix what really matters.
Jim Ivers's picture
With the advent of connected devices, privacy and security have become tightly linked because theft of private data is often the goal of malicious attacks.
Jim Ivers's picture
If we agree that quality and security problems are both a form of defect, then we must sufficiently address both to produce software of the highest integrity.
Adam Meyer's picture
As with anything new, you need to prepare and plan for IoT devices being in your environment to maximize the value they provide, while minimizing the inherent risk of these network-enabled devices.
Dan Cornell's picture
Gaining an understanding of the tools that development teams use provides security teams with valuable insight into how developers work, how they make decisions, and the incentives that drive them.