Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Researchers warn that the vulnerability has existed since September 2017 and has likely been exploited in the wild. [Read More]
French video game company Ubisoft this week confirmed that 'Just Dance' user data was compromised in a recent cybersecurity incident. [Read More]
As the scale and impact of the Log4j security crisis become clearer, defenders brace for a long, bumpy ride filled with software-dependency headaches. [Read More]
Adobe documented at least 60 security vulnerabilities in prominent software products and warned that malicious actors could exploit these bugs for code execution, privilege escalation and denial-of-service attacks. [Read More]
German security researchers document the of a drive-by code execution vulnerability in Windows and criticized Microsoft for botching its response to the security problem. [Read More]
Citing evidence of active exploitation against five specific vulnerabilities, the U.S. cybersecurity agency warned that further delays in applying fixes “pose significant risk to the federal enterprise. [Read More]
Security experts warn that the 'Sabbath' ransomware group is targeting organizations in education, health and natural resources in both the United States and Canada. [Read More]
Security response agencies warn the Zoho flaw puts academic institutions, critical infrastructure and defense contractors are at high risk for APT attacks. [Read More]
The Danish wind turbine manufacturer confirms a cyber attack has impacted parts of internal internal IT infrastructure and that data has been compromised. [Read More]
Redmond says the evasive malware delivery method is being leveraged in attacks to deliver remote access Trojans (RATs), banking malware, and other malicious payloads. [Read More]

FEATURES, INSIGHTS // Disaster Recovery

rss icon

Marcus Ranum's picture
When you start your metrics program, you'll find that a great deal of information can be gleaned from existing data that gets stored in various places – most likely in your system logs.
Chris Hinkley's picture
A multi-layered breach detection and recovery plan is a must to protect your organization, making the difference between a catastrophic breach that devastates your business and a breach that’s quickly contained and terminated.
Chris Poulin's picture
There’s no one size fits all disaster survival plan: a server compromise is vastly different than full scale nuclear attack, and both require situationally appropriate responses.
Danelle Au's picture
What can we glean from "Superstorm" Sandy that will help us deal with security events as disruptive in nature as Super Storm Sandy? Do we need a strategic shift in how we respond to incidents? What are key security observations from this storm?
Rod Rasmussen's picture
In the security and privacy world, 2012 is turning out to be the year for Internet security bills. But why now and why so many Internet protection bills suddenly coming up in Congress?
Ram Mohan's picture
The Amazon Web Services Cloud Outage showed the world that the cloud — while great — does not absolve companies from taking fundamental precautions to safeguard their systems online.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!