Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

Google has finally enabled end-to-end encryption (E2EE) for the Messages app in Android but the privacy-enhancing tool remains somewhat limited. [Read More]
A critical vulnerability discovered in a ThroughTek P2P SDK used by many security camera manufacturers can be exploited to gain remote access to camera feeds. [Read More]
Vulnerabilities discovered in some older Schneider Electric PowerLogic gateways can allow hackers to remotely take control of devices or disrupt them. [Read More]
The STEM Audio Table device was also found to be externally controllable without authentication. [Read More]
General Manager of the Microsoft Threat Intelligence Center (MSTIC) John Lambert recently keynoted the SecurityWeek threat-intelligence summit where he called for a more collaborative approach to information sharing in cybersecurity. [Read More]
Identity management provider Elisity closes Series A funding to help scale and meet demand for its cloud-delivered cybersecurity platform. [Read More]
A researcher has earned $30,000 via Facebook’s bug bounty program for an Instagram vulnerability that exposed private posts. [Read More]
Apple ships an out-of-band iOS update for older iPhones and iPads alongside a warning that a pair of WebKit security vulnerabilities may have been actively exploited. [Read More]
Following a major software supply chain compromise that exposed data for several major companies, CodeCov plans to kill off the Bash Uploader tool that was responsible for the breach. [Read More]
Security researchers at Group-IB believe that Chinese nation-state threat actor APT41 performed the cyberattack against aviation IT firm SITA [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Marie Hattar's picture
Security is never static, and networks will always be evolving, so make sure you’re continuously validating your security posture and ready for whatever comes next.
Idan Aharoni's picture
SPF, DMARC and DKIM are three email security methods that work together to prevent unauthorized third parties from sending emails on behalf of a domain.
Torsten George's picture
Despite the long-standing belief that deploying more security solutions will result in greater protection against threats, the truth of the matter can be very different.
Torsten George's picture
Understanding not just the tail end of the cyber-attack kill chain, but also focusing on initial attack vectors like endpoints provides a roadmap for aligning preventive measures with today’s threats.
Yaniv Vardi's picture
Supply chain cyber risk is complicated and spans the entire lifecycle of a product—across design, manufacturing, distribution, storage, and maintenance.
Tim Bandos's picture
While working from home or even while at work for that matter, follow these steps to avoid behaviors that may let the bad guy in.
Gunter Ollmann's picture
CISOs are increasingly partnering with DevOps leaders and vigilantly modernizing secure development lifecycle (SDLC) processes to embrace new machine learning (ML) approaches.
Joshua Goldfarb's picture
Performing gap analysis well and remediating findings appropriately can help reduce both the number of weak points within your enterprise and your susceptibility to attack at each of them.
John Maddison's picture
Organizations must adopt a holistic approach to securing their distributed networked environment that enables them to see and manage their entire distributed network, including all attack vectors, through a single pane of glass.
Gunter Ollmann's picture
With years of bug bounty programs now behind us, it is interesting to see how the information security sector transformed – or didn’t.