Security Experts:

long dotted


Several critical and high-severity vulnerabilities that can be exploited remotely have been found recently in widely used CODESYS industrial products. [Read More]
Members of the Tor community have raised $86,081 as part of an initiative aimed at securing funds to find and squash bugs in the popular browser. [Read More]
NETGEAR patches DoS vulnerabilities found by Cisco researchers in its N300 series wireless routers. [Read More]
Simjacker is a SIM card attack that could work against over 1 billion mobile phones, and researchers say it has already been exploited by a company to track users. [Read More]
Trustwave researchers discovered five new credential leaking vulnerabilities, two in a D-Link DSL modem and three in multiple Comba Telecom WiFi devices. [Read More]
Telegram was found to breach users’ privacy by failing to remove images from a device’s local storage when the sender selects to delete them for all recipients. [Read More]
Google released Chrome 77 this week and announced that the latest stable version addresses 52 security issues. [Read More]
SAP releases four critical patches as part of its September 2019 Security Patch Day. [Read More]
Siemens issues several security advisories, including for the Windows flaws tracked as DejaBlue and the Linux kernel SACK flaws. [Read More]
Researchers disclose NetCAT, a new side-channel attack method that can be exploited to steal sensitive data from remote servers powered by Intel CPUs with DDIO technology. [Read More]

FEATURES, INSIGHTS // Vulnerabilities

rss icon

Gunter Ollmann's picture
Any bug hunter, security analyst, software vendor, or device manufacturer should not rely on CVSS as the pointy end of the stick for prioritizing remediation.
Gunter Ollmann's picture
In a world of over-hyped bugs, stunt hacking, and branded vulnerability disclosures, my advice to CISOs is to make security lemonade by finding practical next steps to take.
Josh Lefkowitz's picture
Regardless of which framework you use, it’s crucial to operationalize it in the context of your organization’s unique environment and risk factors.
Marc Solomon's picture
Recalculating and reevaluating priorities based on a continuous flow of new data, learnings and your risk profile, helps to ensure you’re staying focused on what matters in a highly dynamic environment.
Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.
Torsten George's picture
Application Programming Interfaces (APIs) provide hackers with multiple venues to access an organization’s data and can even be used to cause massive business disruptions.
Torsten George's picture
Microservices and containers enable faster application delivery and improved IT efficiency. However, the adoption of these technologies has outpaced security.
Oliver Rochford's picture
We can’t rely on our own governments to practice responsible full disclosure. Full Disclosure is compromised. We can’t really blame them. Either everyone discloses, or no-one does.
Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.
Travis Greene's picture
As DevOps and agile development methodologies take greater root in the enterprise, the traditional tools and approaches for eliminating vulnerabilities in code will no longer be able to keep pace.