Security Experts:

long dotted


Critical and high-severity vulnerabilities discovered by researchers in F5’s BIG-IP application delivery controller allow a remote attacker to take complete control of a targeted system. [Read More]
Cisco has patched several vulnerabilities affecting various products, including flaws in Small Business routers and switches. [Read More]
Researchers have discovered ThiefQuest, a new Mac malware that acts like a piece of ransomware, but also allows its operators to steal data and take full control of an infected device. [Read More]
Details on a macOS privacy protections bypass method were published this week, more than six months after Apple was informed of the issue, but failed to deliver a fix. [Read More]
Netgear has started releasing patches for ten vulnerabilities affecting nearly 80 of its products, including flaws disclosed last year at the Pwn2Own hacking contest. [Read More]
Microsoft publishes advisories to provide details on two remote code execution vulnerabilities addressed in the Windows Codecs Library. [Read More]
Researchers show how hackers could target industrial control systems (ICS) using barcode scanners. [Read More]
Palo Alto Networks has patched a critical authentication bypass vulnerability in PAN-OS and US Cyber Command believes foreign APTs will likely attempt to exploit it soon. [Read More]
Driver vulnerabilities can facilitate attacks on ATMs, PoS systems and other devices, warns firmware security company Eclypsium. [Read More]
NVIDIA this week released patches for a dozen vulnerabilities in GPU display drivers and vGPU software, including multiple issues that could lead to code execution. [Read More]

FEATURES, INSIGHTS // Vulnerabilities

rss icon

Torsten George's picture
Application Programming Interfaces (APIs) provide hackers with multiple venues to access an organization’s data and can even be used to cause massive business disruptions.
Torsten George's picture
Microservices and containers enable faster application delivery and improved IT efficiency. However, the adoption of these technologies has outpaced security.
Oliver Rochford's picture
We can’t rely on our own governments to practice responsible full disclosure. Full Disclosure is compromised. We can’t really blame them. Either everyone discloses, or no-one does.
Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.
Travis Greene's picture
As DevOps and agile development methodologies take greater root in the enterprise, the traditional tools and approaches for eliminating vulnerabilities in code will no longer be able to keep pace.
Dan Cornell's picture
When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the various testing approach options.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.
Lance Cottrell's picture
Laws to support swift and automatic updates for all devices, and consequence to organizations that fail to ensure their IoT devices are secure, would be a big step forward for IoT security.
Jim Ivers's picture
With a software composition analysis (SCA) tool in place, security teams can quickly scan an information repository and know where vulnerable software is being used.
David Holmes's picture
The "Reaper" IoT botnet is holding itself up as a blinky light in front of our faces, reminding the InfoSec community that we really need to get ahead of IoT madness.