Security Experts:

Virus & Threats
long dotted


Microsoft has released an out-of-band update after learning that the security patch for CVE-2022-37966 started causing Kerberos authentication issues. [Read More]
Some Cisco Secure Email Gateway filters can be bypassed using specially crafted emails, which Cisco says is caused by an issue with McAfee and Sophos malware scanners. [Read More]
Security researcher publishes proof-of-concept (PoC) code targeting a macOS sandbox escape vulnerability. [Read More]
Security researchers are increasingly looking at Mastodon now that its popularity has soared, and they have started finding vulnerabilities and other issues. [Read More]
Atlassian has patched a security misconfiguration vulnerability in Crowd and a command injection vulnerability in Bitbucket. [Read More]
Microsoft has observed a threat actor tracked as DEV-0569 updating its delivery methods and distributing the Royal ransomware. [Read More]
A critical vulnerability affecting Omron products has been exploited by a sophisticated piece of malware designed to target industrial control systems (ICS). [Read More]
A vulnerability impacting multiple Samba versions could allow an attacker to execute code and potentially take over the system. [Read More]
The cybersecurity powerhouse plans to spend $195 million in cash to acquire Israeli application security startup Cider Security. [Read More]
OpenSSF has announced the adoption of S2C2F, a Microsoft-built framework defining how open source software can be securely consumed. [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Gordon Lawson's picture
Why are zero day exploits so effective, and so highly prized by bad actors? The reason has to do with the way cyber security defenses work.
Torsten George's picture
Unfortunately, there is no such thing as 100 percent protection. Therefore, we cannot solely focus on “Left of Boom” processes, but also have to talk about the “Right of Boom”.
Marc Solomon's picture
Even though things have changed—from SOAR to XDR to CSMA—they have also stayed the same. These new categories are not solutions but really architectures.
Jeff Orloff's picture
Nothing can ever prepare an organization for every ransomware scenario. However, if you train for multiple situations, your team will be able to make decisions more quickly, and react appropriately when an unforeseen incident occurs.
Laurence Pitt's picture
Between the excitement and the comfort of working from home, it can be easy to overlook the risks associated with summer travel, but it’s important to remain careful and vigilant.
Torsten George's picture
When establishing visibility and security controls across endpoints, security practitioners need to understand that each endpoint bears some or all responsibility for its own security.
Torsten George's picture
Digital experience monitoring technology goes beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.
Keith Ibarguen's picture
As email security is an ever-changing landscape, focusing on the most relevant issues in the threat landscape is where organizations need to start.
William Lin's picture
Most organizations want to adopt DevSecOps practices, but their current practices are closer to traditional waterfall methodologies than the agile practices described in this DevSecOps manifesto.
Marc Solomon's picture
XDR architecture must be broad and deep so that organizations can get the most value out of their existing best-of-breed security solutions, including their free, open-source tools.