Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Matrix.org, an open source project for secure and decentralized communications, had its systems hacked and its website defaced. The hacker then revealed the security issues he found. [Read More]
Facebook and Google have wrapped up the first edition of their BountyCon Asia-Pacific bug hunting conference, which resulted in $120,000 awarded in bounties. [Read More]
Patches released by VMware for its ESXi, Workstation and Fusion products address DoS and information disclosure vulnerabilities related to graphics components. [Read More]
Siemens’ Patch Tuesday updates for April 2019 address several serious vulnerabilities, including some DoS flaws affecting many of its industrial products. [Read More]
A series of vulnerabilities found in the WPA3 protocol, dubbed Dragonblood, can be exploited to obtain the password of a Wi-Fi network. [Read More]
Hardcoded admin credentials found in the MyCar Controls mobile applications could have been exploited to locate and gain physical access to a vehicle. [Read More]
SAP this week released 6 Security Notes as part of its April 2019 Security Patch Day, including two that address High severity flaws in Crystal Reports and NetWeaver. [Read More]
An analysis of the reservation systems used by 1,500 hotels revealed that over two-thirds expose user information and allow attackers to cancel bookings. [Read More]
Microsoft fixes over 70 vulnerabilities with April 2019 Patch Tuesday updates, including two Windows zero-days that allow privilege escalation. [Read More]
Adobe patches over 40 vulnerabilities affecting its Acrobat and Reader, Flash Player, Shockwave Player, Dreamweaver, XD, InDesign, Experience Manager Forms, and Bridge CC products. [Read More]

FEATURES, INSIGHTS // Vulnerabilities

rss icon

Marc Solomon's picture
Recalculating and reevaluating priorities based on a continuous flow of new data, learnings and your risk profile, helps to ensure you’re staying focused on what matters in a highly dynamic environment.
Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.
Torsten George's picture
Application Programming Interfaces (APIs) provide hackers with multiple venues to access an organization’s data and can even be used to cause massive business disruptions.
Torsten George's picture
Microservices and containers enable faster application delivery and improved IT efficiency. However, the adoption of these technologies has outpaced security.
Oliver Rochford's picture
We can’t rely on our own governments to practice responsible full disclosure. Full Disclosure is compromised. We can’t really blame them. Either everyone discloses, or no-one does.
Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.
Travis Greene's picture
As DevOps and agile development methodologies take greater root in the enterprise, the traditional tools and approaches for eliminating vulnerabilities in code will no longer be able to keep pace.
Dan Cornell's picture
When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the various testing approach options.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.
Lance Cottrell's picture
Laws to support swift and automatic updates for all devices, and consequence to organizations that fail to ensure their IoT devices are secure, would be a big step forward for IoT security.