Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Microsoft has added new capabilities to its Windows Analytics service to help IT professionals assess whether the Windows devices in their networks are protected against Spectre and Meltdown attacks. [Read More]
Nine remotely exploitable vulnerabilities have been found in Dell EMC's Isilon OneFS platform, a scale-out NAS storage platform that combines modular hardware with unified software to harness unstructured data. [Read More]
SAP’s February 2018 security updates patch a total of 11 new vulnerabilities, including two considered high severity [Read More]
Google patches several critical severity remote code execution (RCE) vulnerabilities in Android [Read More]
Pepperl+Fuchs HMIs are vulnerable to Meltdown and Spectre attacks, but exploitation should not be easy if organizations follow security best practices [Read More]
Schneider Electric patches vulnerabilities in IGSS automation system, including in SCADA software and mobile applications [Read More]
Bitmessage developers rush to patch remote code execution vulnerability in PyBitmessage in response to a zero-day attack [Read More]
Microsoft patches 50 vulnerabilities in Windows, Office and its web browsers – the list does not include any zero-day flaws [Read More]
Adobe patches 39 vulnerabilities in Acrobat and Reader, and two flaws in Experience Manager. No exploits in the wild [Read More]
A zero-day vulnerability impacting Telegram Messenger’s Windows client had been exploited in malicious attacks for months before being discovered and addressed. [Read More]

FEATURES, INSIGHTS // Vulnerabilities

rss icon

Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.
Travis Greene's picture
As DevOps and agile development methodologies take greater root in the enterprise, the traditional tools and approaches for eliminating vulnerabilities in code will no longer be able to keep pace.
Dan Cornell's picture
When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the various testing approach options.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.
Lance Cottrell's picture
Laws to support swift and automatic updates for all devices, and consequence to organizations that fail to ensure their IoT devices are secure, would be a big step forward for IoT security.
Jim Ivers's picture
With a software composition analysis (SCA) tool in place, security teams can quickly scan an information repository and know where vulnerable software is being used.
David Holmes's picture
The "Reaper" IoT botnet is holding itself up as a blinky light in front of our faces, reminding the InfoSec community that we really need to get ahead of IoT madness.
Torsten George's picture
We need to consider whether traditional approaches to vulnerability management are still viable and if just upgrading existing methods or tools is sufficient.
Jalal Bouhdada's picture
Vendors, practitioners and security experts must all work closely together to combat the well-funded actors who pose a threat to medical devices.
Jim Ivers's picture
Why are even the most security-conscious organizations being compromised, and what does it mean for everyone else?