Security Experts:

long dotted


Millions of computers from Dell and other vendors exposed to attacks due to a serious vulnerability in software made by PC-Doctor. [Read More]
Mozilla has patched a second Firefox zero-day vulnerability exploited by hackers to deliver Mac malware to cryptocurrency exchanges. [Read More]
The recently patched Firefox zero-day vulnerability (CVE-2019-11707) has been exploited to deliver Windows and Mac malware to cryptocurrency exchanges. [Read More]
Cisco patches critical and high severity vulnerabilities in SD-WAN, DNA Center, TelePresence, StarOS, RV router, Prime Service Catalog, and Meeting Server products. [Read More]
Oracle patches another critical remote code execution vulnerability in WebLogic (CVE-2019-2729). The flaw is similar to CVE-2019-2725, which has been exploited in the wild. [Read More]
Mozilla has released updates for Firefox to patch a critical zero-day vulnerability (CVE-2019-11707) exploited in targeted attacks. [Read More]
A critical remote code execution vulnerability allows an unauthenticated hacker to take complete control of some TP-Link Wi-Fi extenders. Firmware updates are available. [Read More]
Facebook’s first-ever global Capture the Flag (CTF) competition took place earlier this month and the company has now made the challenges available in open source. [Read More]
Serious TCP SACK vulnerabilities affecting the Linux kernel can be exploited to launch remote DoS attacks on servers, Android smartphones, and embedded devices. [Read More]
The DHS’s Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert for the Windows vulnerability tracked as BlueKeep and CVE-2019-0708 after successfully exploiting it for remote code execution. [Read More]

FEATURES, INSIGHTS // Vulnerabilities

rss icon

Marc Solomon's picture
Recalculating and reevaluating priorities based on a continuous flow of new data, learnings and your risk profile, helps to ensure you’re staying focused on what matters in a highly dynamic environment.
Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.
Torsten George's picture
Application Programming Interfaces (APIs) provide hackers with multiple venues to access an organization’s data and can even be used to cause massive business disruptions.
Torsten George's picture
Microservices and containers enable faster application delivery and improved IT efficiency. However, the adoption of these technologies has outpaced security.
Oliver Rochford's picture
We can’t rely on our own governments to practice responsible full disclosure. Full Disclosure is compromised. We can’t really blame them. Either everyone discloses, or no-one does.
Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.
Travis Greene's picture
As DevOps and agile development methodologies take greater root in the enterprise, the traditional tools and approaches for eliminating vulnerabilities in code will no longer be able to keep pace.
Dan Cornell's picture
When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the various testing approach options.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.
Lance Cottrell's picture
Laws to support swift and automatic updates for all devices, and consequence to organizations that fail to ensure their IoT devices are secure, would be a big step forward for IoT security.