Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

Kasada has closed a $23 million Series C funding round led by StepStone Group. [Read More]
Security problems at enterprise software provider Zoho multiply with confirmation of a new critical authentication bypass vulnerability -- the third in four months -- being exploited in the wild. [Read More]
Distributed through the Hancitor malware loader, Cuba ransomware has compromised at least 49 targets in 5 sectors. [Read More]
Researchers have developed a tool that checks web browsers for cross-site leaks, and they have identified 14 new types of XS-Leak attacks. [Read More]
Researchers flag hundreds of security flaws in routers from Asus, AVM, D-Link, Edimax, Linksys, Netgear, Synology and TP Link. [Read More]
CISA has released six advisories in the past week to inform organizations about vulnerabilities affecting several Hitachi Energy products. [Read More]
USB drives serve as a physical medium for transmitting data to and from air-gapped systems. [Read More]
Panther Labs, a startup that specializes in detection and response analytics, has raised a whopping $120 million in a new round of funding. [Read More]
Citing evidence of active exploitation against five specific vulnerabilities, the U.S. cybersecurity agency warned that further delays in applying fixes “pose significant risk to the federal enterprise. [Read More]
The vulnerability could lead to application crashes and potentially enable arbitrary code execution. [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Marc Solomon's picture
If you are among the growing group of organizations looking to an MDR provider to supplement your security operations with XDR, make sure you consider these three factors.
Keith Ibarguen's picture
Leverage the power of the collective - the network effect – for its ever-evolving intelligence wherever possible to keep your employees free of all the bad stuff that has made it to their inboxes.
Marc Solomon's picture
The goal of XDR is detection and response across the infrastructure, across all attack vectors, across different vendors, and across security technologies that are cloud based and on premises.
Laurence Pitt's picture
Cybersecurity Awareness Month is an excellent time to reflect on any changes made, and that might still need to be made since, as for many people hybrid has become the working ‘normal.’
Keith Ibarguen's picture
Far too many engineers in the trenches don’t take the time to lift their heads to see context, so when good (and bad) things happen, this is a great management opportunity that you should take full advantage of.
Marc Solomon's picture
Enterprises can't rely on Endpoint Protection Platforms (EPP) or Endpoint Detection and Response (EDR) tools to detect suspicious activity on a user’s system to quarantine the system or even to reimage.
Torsten George's picture
As it has become clear that remote/hybrid work is here to stay, IT security practitioners must figure out how to enable a secure and resilient anywhere workforce to minimize their future risk exposure.
Joshua Goldfarb's picture
The question of the importance of the state of a client device is a debate that has been around for a few years in the security field.
Marc Solomon's picture
Evolving our definition of detection to encompass greater breadth and depth of understanding through internal and external data aggregation, correlation and investigation, delivers the information we need to execute faster with confidence.
Keith Ibarguen's picture
Leveraging humans for detection makes it hard for the attackers to predict whether or not their malicious emails will be identified and using technology to automate response provides scale and speed in resolution.