Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

Apple this week released patches to address a handful of security vulnerabilities in macOS, iOS, and Safari. [Read More]
A researcher has developed a tool that helps Mac laptop users detect evil maid attacks by monitoring the state of the device’s lid [Read More]
A vulnerability in NVIDIA's Tegra chipsets allows for the execution of custom code on locked-down devices, security researcher Kate Temkin reveals. [Read More]
Hackers can steal private keys from air-gapped cryptocurrency wallets using physical, electromagnetic, electric, magnetic, acoustic, optical, and thermal techniques [Read More]
Foxit has addressed over a dozen vulnerabilities in their PDF Reader, a free application that provides users with an alternative to Adobe Acrobat Reader. [Read More]
Drupal will release a follow-up patch for Drupalgeddon2 on April 25. Attackers continue to exploit the vulnerability to deliver various types of malware [Read More]
Oath paid more than $400,000 in bounties during the H1-415 one-day HackerOne event in San Francisco, where 41 hackers from 11 countries were present. [Read More]
A cyber espionage group tracked as Orangeworm has been targeting healthcare organizations in the U.S., Europe and Asia, but it does not appear to be a state-sponsored operation [Read More]
A Windows 10 vulnerability that could bypass Windows Lockdown Policy and result in arbitrary code execution remains unpatched 90 days after Microsoft has been informed on the bug’s existence. [Read More]
Microsoft unveils Windows Defender System Guard runtime attestation, a new Windows platform security technology for all editions of Windows [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Ionut Arghire's picture
The default configuration on the new Western Digital My Cloud EX2 storage device allows any users on the network to retrieve files via HTTP requests, Trustwave has discovered.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Jack Danahy's picture
To mitigate the risk of attacks, IT teams should disable unused tools and components, while deploying endpoint protection that doesn’t rely solely on file scanning or whitelisting.
Markus Jakobsson's picture
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.
Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.
Travis Greene's picture
As DevOps and agile development methodologies take greater root in the enterprise, the traditional tools and approaches for eliminating vulnerabilities in code will no longer be able to keep pace.
Dan Cornell's picture
When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the various testing approach options.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.
Lance Cottrell's picture
Laws to support swift and automatic updates for all devices, and consequence to organizations that fail to ensure their IoT devices are secure, would be a big step forward for IoT security.
Jim Ivers's picture
With a software composition analysis (SCA) tool in place, security teams can quickly scan an information repository and know where vulnerable software is being used.