Security Experts:

long dotted


A newly discovered attack against Google Home and Chromecast devices can reveal a user’s precise physical location, a security researcher has discovered. [Read More]
Roughly 400 cameras from Axis are exposed to remote attacks due to several critical vulnerabilities discovered by researchers. Patches are available [Read More]
Microsoft patches remote code execution vulnerability affecting the wimgapi library. The company and Cisco, whose researchers found the flaw, disagree on its severity [Read More]
Schneider Electric has patched several vulnerabilities, including ones rated critical, in its U.motion Builder building automation tool [Read More]
Siemens patches vulnerabilities in SCALANCE and other devices, including CSRF, XSS, command injection and code execution issues [Read More]
GnuPG recently addressed an input sanitization vulnerability where a remote attacker could spoof arbitrary signatures [Read More]
One of the vulnerabilities patched by Microsoft this month was a flaw in Cortana that can allow an attacker to elevate privileges and execute code from the lock screen [Read More]
Intel Core processors affected by LazyFP vulnerability similar to Meltdown. Patches being developed, but many systems already not impacted [Read More]
Cybercriminals continue to add new exploits, including for vulnerabilities that recently had a zero-day status, to exploit kits [Read More]
Of the 10 Security Notes in SAP’s June 2018 Security Patch Day, 5 were updates for previously released Security Notes, including 2 rated critical [Read More]

FEATURES, INSIGHTS // Vulnerabilities

rss icon

Torsten George's picture
Microservices and containers enable faster application delivery and improved IT efficiency. However, the adoption of these technologies has outpaced security.
Oliver Rochford's picture
We can’t rely on our own governments to practice responsible full disclosure. Full Disclosure is compromised. We can’t really blame them. Either everyone discloses, or no-one does.
Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.
Travis Greene's picture
As DevOps and agile development methodologies take greater root in the enterprise, the traditional tools and approaches for eliminating vulnerabilities in code will no longer be able to keep pace.
Dan Cornell's picture
When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the various testing approach options.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.
Lance Cottrell's picture
Laws to support swift and automatic updates for all devices, and consequence to organizations that fail to ensure their IoT devices are secure, would be a big step forward for IoT security.
Jim Ivers's picture
With a software composition analysis (SCA) tool in place, security teams can quickly scan an information repository and know where vulnerable software is being used.
David Holmes's picture
The "Reaper" IoT botnet is holding itself up as a blinky light in front of our faces, reminding the InfoSec community that we really need to get ahead of IoT madness.
Torsten George's picture
We need to consider whether traditional approaches to vulnerability management are still viable and if just upgrading existing methods or tools is sufficient.