Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

Roughly 400 cameras from Axis are exposed to remote attacks due to several critical vulnerabilities discovered by researchers. Patches are available [Read More]
DHS and FBI publish another report describing a piece of malware allegedly used by the North Korean government. The malware is tracked as 'Typeframe' [Read More]
UK-based start-up Tessian, which uses machine learning artificial intelligence to prevent sensitive data leakage via email, has raised $13 million in a Series A funding. [Read More]
Chinese threat actor known as APT15, Ke3chang, Mirage, Vixen Panda and Playful Dragon creates new MirageFox malware, and researchers have found similarities to the first malware used by the group [Read More]
The number of cyber-attacks targeting Singapore skyrocketed from June 11 to June 12, during the meeting between U.S. President Donald Trump and North Korean President Kim Jong-un in a Singapore hotel, and most of these attacks originated from Russia [Read More]
Trend Micro analyzes new campaign that appears to be linked to MuddyWater espionage [Read More]
Microsoft patches remote code execution vulnerability affecting the wimgapi library. The company and Cisco, whose researchers found the flaw, disagree on its severity [Read More]
Facebook claims it removes 99% of content posted by terrorist organizations without the need for users to report it. 1.9 million pieces of this type of content removed in Q1 2018 [Read More]
Schneider Electric has patched several vulnerabilities, including ones rated critical, in its U.motion Builder building automation tool [Read More]
Siemens patches vulnerabilities in SCALANCE and other devices, including CSRF, XSS, command injection and code execution issues [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

John Maddison's picture
It is essential to understand exactly what is meant by machine learning so you can quickly differentiate between those solutions that actually provide the technology you need to stay ahead in the cyber war arms race, and those capitalizing on market hype.
Torsten George's picture
Microservices and containers enable faster application delivery and improved IT efficiency. However, the adoption of these technologies has outpaced security.
Oliver Rochford's picture
We can’t rely on our own governments to practice responsible full disclosure. Full Disclosure is compromised. We can’t really blame them. Either everyone discloses, or no-one does.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Jack Danahy's picture
To mitigate the risk of attacks, IT teams should disable unused tools and components, while deploying endpoint protection that doesn’t rely solely on file scanning or whitelisting.
Markus Jakobsson's picture
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.
Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.
Travis Greene's picture
As DevOps and agile development methodologies take greater root in the enterprise, the traditional tools and approaches for eliminating vulnerabilities in code will no longer be able to keep pace.
Dan Cornell's picture
When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the various testing approach options.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.