Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Siemens SCALANCE X industrial switches are vulnerable to DoS attacks, but patches have yet to be released. [Read More]
More than 750,000 systems remain vulnerable to the BlueKeep vulnerability as patching rate has decreased by around 85%, a new report from security firm BitSight reveals. [Read More]
Microsoft’s August 2019 Patch Tuesday updates fix over 90 vulnerabilities, but none of them have been exploited in attacks or disclosed publicly before the patches were released. [Read More]
Adobe has patched 118 vulnerabilities across its After Effects, Character Animator, Premiere Pro, Prelude, Creative Cloud, Acrobat and Reader, Experience Manager and Photoshop products. [Read More]
Researchers have demonstrated serious SQLite vulnerabilities by hacking an iPhone and a C&C server used by malware. [Read More]
Researchers have demonstrated how malicious actors could launch ransomware attacks on DSLR cameras. [Read More]
Apple is making its bug bounty program public, it’s expanding it to cover macOS and other products, and it’s increasing the top reward to $1 million. [Read More]
Researchers have analyzed device drivers from major vendors and found that 40 drivers from 20 different companies have vulnerabilities that can be exploited to deploy persistent malware. [Read More]
Exploitation of a coding bug in F5's BIG-IP load balancer could be as simple as submitting a command or piece of code as part of a web request. [Read More]
Hackers can use rogue engineering stations to take control of Siemens PLCs while hiding the attack from the engineer monitoring the system, researchers demonstrate. [Read More]

FEATURES, INSIGHTS // Vulnerabilities

rss icon

David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.
Lance Cottrell's picture
Laws to support swift and automatic updates for all devices, and consequence to organizations that fail to ensure their IoT devices are secure, would be a big step forward for IoT security.
Jim Ivers's picture
With a software composition analysis (SCA) tool in place, security teams can quickly scan an information repository and know where vulnerable software is being used.
David Holmes's picture
The "Reaper" IoT botnet is holding itself up as a blinky light in front of our faces, reminding the InfoSec community that we really need to get ahead of IoT madness.
Torsten George's picture
We need to consider whether traditional approaches to vulnerability management are still viable and if just upgrading existing methods or tools is sufficient.
Jalal Bouhdada's picture
Vendors, practitioners and security experts must all work closely together to combat the well-funded actors who pose a threat to medical devices.
Jim Ivers's picture
Why are even the most security-conscious organizations being compromised, and what does it mean for everyone else?
David Holmes's picture
DUHK and ROCA are both implementation-specific vulnerabilities concerning one of my favorite topics, random number generators.
Torsten George's picture
The end user community is at the mercy of security researchers to act responsibly in order to limit the potential for their findings to be used for malicious purposes.
Alastair Paterson's picture
With greater awareness about POS system attacks, operations against third-party suppliers, and the vulnerabilities of public or semi-public Wi-Fi networks, companies can do a lot to mitigate risk and ensure safer journeys for travelers.