Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Multiple vulnerabilities identified in Philips patient monitoring solutions could provide attackers with unauthorized access to patient data. [Read More]
The U.K.’s National Cyber Security Center (NCSC) has released a guide to help organizations get started with implementing a vulnerability disclosure process. [Read More]
Representatives of the infosec community have signed an open letter in response to an amicus brief that mobile elections platform developer Voatz filed with the U.S. Supreme Court in the case of Nathan Van Buren. [Read More]
Microsoft releases Project OneFuzz, an open source fuzzing framework for Azure that the company has been using internally for the past year. [Read More]
Researchers discovered critical vulnerabilities in MobileIron’s MDM solutions that can be exploited for unauthenticated remote code execution. [Read More]
Several major ICS vendors have released security advisories in response to the recently disclosed vulnerabilities affecting the CodeMeter licensing and DRM solution. [Read More]
Attacks targeting a recently patched vulnerability in the WordPress plugin File Manager are ramping up. [Read More]
Google has awarded a $20,000 bug bounty for a use-after-free vulnerability in Chrome that can be exploited for a sandbox escape. [Read More]
Palo Alto Networks has patched several critical and high-severity DoS and code execution vulnerabilities in PAN-OS. [Read More]
A vulnerability in the Cross-Transport Key Derivation (CTKD) of devices supporting both Bluetooth BR/EDR and LE could allow MITM attacks. [Read More]

FEATURES, INSIGHTS // Vulnerabilities

rss icon

Gunter Ollmann's picture
CISOs are increasingly partnering with DevOps leaders and vigilantly modernizing secure development lifecycle (SDLC) processes to embrace new machine learning (ML) approaches.
Joshua Goldfarb's picture
Performing gap analysis well and remediating findings appropriately can help reduce both the number of weak points within your enterprise and your susceptibility to attack at each of them.
John Maddison's picture
Organizations must adopt a holistic approach to securing their distributed networked environment that enables them to see and manage their entire distributed network, including all attack vectors, through a single pane of glass.
Gunter Ollmann's picture
With years of bug bounty programs now behind us, it is interesting to see how the information security sector transformed – or didn’t.
Marie Hattar's picture
There are good and bad ways to make vulnerabilities known. A premature “full disclosure” of a previously unknown issue can unleash the forces of evil, and the “black hats” often move faster than vendors or enterprise IT teams.
Gunter Ollmann's picture
Any bug hunter, security analyst, software vendor, or device manufacturer should not rely on CVSS as the pointy end of the stick for prioritizing remediation.
Gunter Ollmann's picture
In a world of over-hyped bugs, stunt hacking, and branded vulnerability disclosures, my advice to CISOs is to make security lemonade by finding practical next steps to take.
Josh Lefkowitz's picture
Regardless of which framework you use, it’s crucial to operationalize it in the context of your organization’s unique environment and risk factors.
Marc Solomon's picture
Recalculating and reevaluating priorities based on a continuous flow of new data, learnings and your risk profile, helps to ensure you’re staying focused on what matters in a highly dynamic environment.
Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.