Security Experts:

long dotted


A vulnerability in Microsoft's Active Directory Federation Services (ADFS) allows any attacker in the same organization with a valid second factor to access any other user's account if they can obtain that user's credentials. [Read More]
Adobe patches nearly a dozen vulnerabilities in Flash Player, the Creative Cloud Desktop Application, Experience Manager, and Acrobat and Reader [Read More]
Researchers disclose details of new attack method that can be used to decrypt communications. Products from Cisco, Huawei, ZyXEL and Clavister are affected [Read More]
U.S. Department of Defense invites experts to hack the Marine Corps in new bug bounty program [Read More]
NetComm patches critical vulnerabilities in 4G LTE Light industrial M2M routers. The flaws can be exploited remotely to completely compromise a device [Read More]
Researchers show how hackers could target urban water utilities through the smart irrigation systems used by their customers [Read More]
Check Point researchers show how cyber criminals could infiltrate a home or corporate network by exploiting all-in-one printer-fax machines. [Read More]
Oracle informed users late on Friday of a critical Database vulnerability that should be patched ASAP. Flaw can lead to complete compromise of Database and shell access to underlying server [Read More]
A researcher discovered that hundreds of airplanes could have been hacked remotely from the ground via vulnerable satcom systems [Read More]
Brand new Mac computers used in enterprise environments can be hacked on the first boot via Apple’s mobile device management (MDM) protocol, researchers show [Read More]

FEATURES, INSIGHTS // Vulnerabilities

rss icon

Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.
Torsten George's picture
Application Programming Interfaces (APIs) provide hackers with multiple venues to access an organization’s data and can even be used to cause massive business disruptions.
Torsten George's picture
Microservices and containers enable faster application delivery and improved IT efficiency. However, the adoption of these technologies has outpaced security.
Oliver Rochford's picture
We can’t rely on our own governments to practice responsible full disclosure. Full Disclosure is compromised. We can’t really blame them. Either everyone discloses, or no-one does.
Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.
Travis Greene's picture
As DevOps and agile development methodologies take greater root in the enterprise, the traditional tools and approaches for eliminating vulnerabilities in code will no longer be able to keep pace.
Dan Cornell's picture
When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the various testing approach options.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.
Lance Cottrell's picture
Laws to support swift and automatic updates for all devices, and consequence to organizations that fail to ensure their IoT devices are secure, would be a big step forward for IoT security.
Jim Ivers's picture
With a software composition analysis (SCA) tool in place, security teams can quickly scan an information repository and know where vulnerable software is being used.