Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A vulnerability in NVIDIA's Tegra chipsets allows for the execution of custom code on locked-down devices, security researcher Kate Temkin reveals. [Read More]
Hackers can steal private keys from air-gapped cryptocurrency wallets using physical, electromagnetic, electric, magnetic, acoustic, optical, and thermal techniques [Read More]
Foxit has addressed over a dozen vulnerabilities in their PDF Reader, a free application that provides users with an alternative to Adobe Acrobat Reader. [Read More]
Drupal will release a follow-up patch for Drupalgeddon2 on April 25. Attackers continue to exploit the vulnerability to deliver various types of malware [Read More]
Oath paid more than $400,000 in bounties during the H1-415 one-day HackerOne event in San Francisco, where 41 hackers from 11 countries were present. [Read More]
A Windows 10 vulnerability that could bypass Windows Lockdown Policy and result in arbitrary code execution remains unpatched 90 days after Microsoft has been informed on the bug’s existence. [Read More]
Researchers claim hackers can remotely exploit an unpatched command injection vulnerability to take control of LG NAS devices [Read More]
FDA reveals its plans for medical device cybersecurity, including requiring update and patch capabilities built into devices, updated guidance for protecting against risks, and policies and procedures for vulnerability disclosures [Read More]
LinkedIn patches AutoFill vulnerability that could have been exploited to harvest data from users’ profiles [Read More]
Cisco patches critical remote code execution vulnerability in WebEx and a critical information disclosure flaw in UCS Director [Read More]

FEATURES, INSIGHTS // Vulnerabilities

rss icon

Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.
Travis Greene's picture
As DevOps and agile development methodologies take greater root in the enterprise, the traditional tools and approaches for eliminating vulnerabilities in code will no longer be able to keep pace.
Dan Cornell's picture
When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the various testing approach options.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.
Lance Cottrell's picture
Laws to support swift and automatic updates for all devices, and consequence to organizations that fail to ensure their IoT devices are secure, would be a big step forward for IoT security.
Jim Ivers's picture
With a software composition analysis (SCA) tool in place, security teams can quickly scan an information repository and know where vulnerable software is being used.
David Holmes's picture
The "Reaper" IoT botnet is holding itself up as a blinky light in front of our faces, reminding the InfoSec community that we really need to get ahead of IoT madness.
Torsten George's picture
We need to consider whether traditional approaches to vulnerability management are still viable and if just upgrading existing methods or tools is sufficient.
Jalal Bouhdada's picture
Vendors, practitioners and security experts must all work closely together to combat the well-funded actors who pose a threat to medical devices.
Jim Ivers's picture
Why are even the most security-conscious organizations being compromised, and what does it mean for everyone else?