Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

Several serious vulnerabilities have been found by a researcher in WAGO 852 industrial managed switches. [Read More]
A researcher discovered an XSS vulnerability that could have been exploited to attack Google employees and possibly gain access to invoices and other sensitive information. [Read More]
Two U.S. senators asked the FBI on Wednesday to explain what it has done to investigate the suspected hack by Russian intelligence of a Florida-based voting software company before the 2016 election. [Read More]
Encrypted messaging service Telegram suffered a major cyber-attack that appeared to originate from China, the company's CEO said Thursday, linking it to the ongoing political unrest in Hong Kong. [Read More]
Microsoft released security patches for nearly 90 vulnerabilities, including two Critical bugs impacting the proprietary authentication protocol NTLM. [Read More]
Email-focused cybersecurity firm Vade Secure has agreed to a €70 million (approximately US$79.3 million) investment by venture capital firm General Catalyst. [Read More]
A critical vulnerability found in a popular Evernote extension for Chrome can be exploited to steal sensitive data from the websites accessed by a user. [Read More]
Hackers can hide malware in DICOM medical imaging files, the DHS’s NCCIC warned on Tuesday. [Read More]
Microsoft fixes nearly 90 vulnerabilities with its June 2019 Patch Tuesday updates, including four privilege escalation flaws disclosed by the researcher known as SandboxEscaper. [Read More]
Researchers disclose RAMBleed, a new type of side-channel attack on DRAM that can be used to obtain potentially sensitive data, such as a 2048-bit RSA key, from a device’s memory. [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Devon Kerr's picture
Devon Kerr explains what happened when a municipality inadvertently deployed a brand-new endpoint protection technology across a small part of their production network.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Ashley Arbuckle's picture
By learning from the past there are many steps we can take to strength our approach to security as attackers continue to turn to email to help accomplish their mission.
Siggi Stefnisson's picture
“Evasive phishing" is not a term much heard, but we all will—and need to—start talking a lot more about it than we have in the past.
Alastair Paterson's picture
BEC is becoming increasingly profitable for threat actors as organizations are making it easy for adversaries to gain access to the valuable information that sits within these inboxes.
Siggi Stefnisson's picture
We should be thinking about how users work, what they do and how it affects the security posture of the business, but does security really start with them?
Torsten George's picture
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.
Marc Solomon's picture
Recalculating and reevaluating priorities based on a continuous flow of new data, learnings and your risk profile, helps to ensure you’re staying focused on what matters in a highly dynamic environment.
Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.
Siggi Stefnisson's picture
Ninety percent of breaches may begin with an email, but today most of the action happens well after an inbound email has been scanned and delivered.