Security Experts:

long dotted


SQLite vulnerability dubbed Magellan can be exploited for remote code execution, information leaks and DoS attacks. Chrome and other popular applications using SQLite are affected. [Read More]
Facebook discovered a vulnerability in the Photo API that could have allowed third-party apps to access all of a user’s photos. Up to 6.8 million users and 1,500 apps are impacted. [Read More]
Siemens SINUMERIK controllers are affected by DoS, privilege escalation and code execution vulnerabilities, including several flaws rated critical. [Read More]
Facebook has paid out over $1.1 million through its bug bounty program in 2018, which brings the total paid by the social media giant since the launch of its program to $7.5 million. [Read More]
WordPress 5.0.1 patches several vulnerabilities, including XSS flaws and weaknesses that allow attackers to delete files, create posts of unauthorized types, and obtain email addresses and passwords. [Read More]
GitLab launches public bug bounty program with rewards of up to $12,000 for critical vulnerabilities. [Read More]
A government organization in Rhode Island has initiated a class action against Alphabet over the recent Google+ API security incidents. [Read More]
Grammarly launches public bug bounty program with standard rewards of up to $3,000 for critical vulnerabilities. [Read More]
SAP this week released its December 2018 set of security updates to address a dozen vulnerabilities in its products, including a Critical flaw in Hybris Commerce. [Read More]
The Windows kernel zero-day patched by Microsoft this week has been exploited by several threat actors, including a new group tracked by Kaspersky as SandCat. [Read More]

FEATURES, INSIGHTS // Vulnerabilities

rss icon

Marc Solomon's picture
Recalculating and reevaluating priorities based on a continuous flow of new data, learnings and your risk profile, helps to ensure you’re staying focused on what matters in a highly dynamic environment.
Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.
Torsten George's picture
Application Programming Interfaces (APIs) provide hackers with multiple venues to access an organization’s data and can even be used to cause massive business disruptions.
Torsten George's picture
Microservices and containers enable faster application delivery and improved IT efficiency. However, the adoption of these technologies has outpaced security.
Oliver Rochford's picture
We can’t rely on our own governments to practice responsible full disclosure. Full Disclosure is compromised. We can’t really blame them. Either everyone discloses, or no-one does.
Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.
Travis Greene's picture
As DevOps and agile development methodologies take greater root in the enterprise, the traditional tools and approaches for eliminating vulnerabilities in code will no longer be able to keep pace.
Dan Cornell's picture
When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the various testing approach options.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.
Lance Cottrell's picture
Laws to support swift and automatic updates for all devices, and consequence to organizations that fail to ensure their IoT devices are secure, would be a big step forward for IoT security.