Security Experts:

long dotted


A DoS vulnerability can be exploited to make Siemens building automation controllers unavailable for days, experts warn. [Read More]
Thousands of Zyxel firewalls could be vulnerable to remote attacks due to a critical vulnerability discovered by Rapid7. [Read More]
A total of 17 vulnerabilities have been found in an industrial router made by InHand Networks, including flaws that can be chained to achieve root access by getting a user to click on a link. [Read More]
Texas startup Balkan ID banks $5.75 million in seed funding to help organizations find and remediate risky privileges across SaaS and public cloud infrastructure. [Read More]
Two vulnerabilities in the UEFI firmware of more than 200 HP laptops and workstations could allow an attacker to gain elevated privileges and run code in the BIOS. [Read More]
Researchers looked at what a hacker with physical access can do with Konica Minolta printers — the answer: a lot. [Read More]
Impacting multiple processor models, the security issues could lead to privilege escalation or information disclosure. [Read More]
Over the last 24 hours, two Silicon Valley startups jostling for space in the corporate email security market raised venture capital funding at a combined valuation of $5.1 billion. [Read More]
The latest Chrome iteration resolves 13 vulnerabilities, including nine reported by external researchers. [Read More]
Researchers have analyzed the potential risks associated with vanity URLs for popular SaaS applications such as Box, Zoom and Google Docs. [Read More]

FEATURES, INSIGHTS // Vulnerabilities

rss icon

Josh Lefkowitz's picture
Regardless of which framework you use, it’s crucial to operationalize it in the context of your organization’s unique environment and risk factors.
Marc Solomon's picture
Recalculating and reevaluating priorities based on a continuous flow of new data, learnings and your risk profile, helps to ensure you’re staying focused on what matters in a highly dynamic environment.
Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.
Torsten George's picture
Application Programming Interfaces (APIs) provide hackers with multiple venues to access an organization’s data and can even be used to cause massive business disruptions.
Torsten George's picture
Microservices and containers enable faster application delivery and improved IT efficiency. However, the adoption of these technologies has outpaced security.
Oliver Rochford's picture
We can’t rely on our own governments to practice responsible full disclosure. Full Disclosure is compromised. We can’t really blame them. Either everyone discloses, or no-one does.
Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.
Travis Greene's picture
As DevOps and agile development methodologies take greater root in the enterprise, the traditional tools and approaches for eliminating vulnerabilities in code will no longer be able to keep pace.
Dan Cornell's picture
When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the various testing approach options.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.