Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Patch Tuesday takes on extra urgency this month with the news that at least six previously undocumented vulnerabilities are being actively exploited in the wild. [Read More]
Adobe's June batch of security patches address a swathe of potentially dangerous vulnerabilities in Adobe Acrobat and Reader, Adobe Photoshop, and the ever-present Adobe Creative Cloud Desktop Application. [Read More]
Organizations have been warned about DoS vulnerabilities found in three popular open source message brokers, namely RabbitMQ, EMQ X and VerneMQ. [Read More]
Through a new partnership with Bugcrowd and Endyna, CISA seeks to help federal agencies identify and monitor vulnerabilities in their systems. [Read More]
Google has addressed a severe security hole in the System component that could lead to remote code execution. [Read More]
Vulnerabilities found in WAGO controllers can allow hackers to disrupt technological processes, which can lead to industrial accidents, researchers warned. [Read More]
Navistar International Corporation confirms data stolen in cyberattack that affected some operations. [Read More]
Palo Alto researchers document a new malware that leverages Windows container escape techniques and can achieve code execution on the node and spread to entire Kubernetes clusters. [Read More]
The Microsoft-owned platform permits dual-use security technologies, considering them beneficial to the security community. [Read More]
Attacks exploiting a critical vulnerability in VMware vCenter Server (CVE-2021-21985) started roughly one week after it was patched by the vendor. [Read More]

FEATURES, INSIGHTS // Vulnerabilities

rss icon

Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.
Torsten George's picture
Application Programming Interfaces (APIs) provide hackers with multiple venues to access an organization’s data and can even be used to cause massive business disruptions.
Torsten George's picture
Microservices and containers enable faster application delivery and improved IT efficiency. However, the adoption of these technologies has outpaced security.
Oliver Rochford's picture
We can’t rely on our own governments to practice responsible full disclosure. Full Disclosure is compromised. We can’t really blame them. Either everyone discloses, or no-one does.
Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.
Travis Greene's picture
As DevOps and agile development methodologies take greater root in the enterprise, the traditional tools and approaches for eliminating vulnerabilities in code will no longer be able to keep pace.
Dan Cornell's picture
When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the various testing approach options.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.
Lance Cottrell's picture
Laws to support swift and automatic updates for all devices, and consequence to organizations that fail to ensure their IoT devices are secure, would be a big step forward for IoT security.
Jim Ivers's picture
With a software composition analysis (SCA) tool in place, security teams can quickly scan an information repository and know where vulnerable software is being used.