Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

The threat actor behind the DNSpionage campaign has switched to new malware in attacks observed earlier this month. [Read More]
Serious DoS and access control vulnerabilities have been found by researchers in X-ray devices from Fujifilm. [Read More]
Google this week released Chrome 74 to the stable channel with patches for 39 vulnerabilities, as well as with several other tweaks inside. [Read More]
A serious vulnerability in some of Rockwell Automation’s MicroLogix and CompactLogix PLCs allows a remote, unauthenticated attacker to redirect users to malicious websites. [Read More]
A financially motivated threat actor believed to speak Russian has used remote access Trojans (RATs) in attacks on financial entities in the United States and worldwide. [Read More]
Updates for Drupal 7 and 8 patch several vulnerabilities affecting third-party Symfony and jQuery components used by Drupal. [Read More]
Researchers demonstrate an interesting type of DoS attack on PLCs, where network flooding can lead to the disruption of the physical process controlled by the device. [Read More]
Cisco releases patches for 30 vulnerabilities, including a critical bug impacting ASR 9000 Series Aggregation Services Routers running IOS XR 64-bit software. [Read More]
Hackers scrambled to erase their digital footprints after FireEye linked the Triton/Trisis malware to a Russian government research institute. [Read More]
Most of the malicious activity by Brazilian hackers is within Brazil against Brazilians, but this does not mean that Brazil lacks hacking capabilities, nor that the rest of the world can ignore Brazilian hackers. [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Ashley Arbuckle's picture
By learning from the past there are many steps we can take to strength our approach to security as attackers continue to turn to email to help accomplish their mission.
Siggi Stefnisson's picture
“Evasive phishing" is not a term much heard, but we all will—and need to—start talking a lot more about it than we have in the past.
Alastair Paterson's picture
BEC is becoming increasingly profitable for threat actors as organizations are making it easy for adversaries to gain access to the valuable information that sits within these inboxes.
Siggi Stefnisson's picture
We should be thinking about how users work, what they do and how it affects the security posture of the business, but does security really start with them?
Torsten George's picture
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.
Marc Solomon's picture
Recalculating and reevaluating priorities based on a continuous flow of new data, learnings and your risk profile, helps to ensure you’re staying focused on what matters in a highly dynamic environment.
Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.
Siggi Stefnisson's picture
Ninety percent of breaches may begin with an email, but today most of the action happens well after an inbound email has been scanned and delivered.
Torsten George's picture
Application Programming Interfaces (APIs) provide hackers with multiple venues to access an organization’s data and can even be used to cause massive business disruptions.
John Maddison's picture
It is essential to understand exactly what is meant by machine learning so you can quickly differentiate between those solutions that actually provide the technology you need to stay ahead in the cyber war arms race, and those capitalizing on market hype.