Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A critical vulnerability in Splunk Enterprise deployment servers allows clients to deploy forwarder bundles to other clients. [Read More]
As of June 15, 2022, Microsoft will no longer support the once-dominant browser that legions of web surfers loved to hate — and a few still claim to adore. [Read More]
Academic researchers describe Hertzbleed, a new Intel and AMD CPU side-channel attack that leverages remote timing to extract secrets from the targeted system. [Read More]
A vulnerability in Citrix ADM leads to system corruption, allowing an attacker to reset the administrator password at reboot and log in with default admin credentials. [Read More]
German software maker SAP has released 12 new and updated security notes on its June 2022 Security Patch Day. [Read More]
Microsoft has finally patched the Windows vulnerability known as Follina and CVE-2022-30190, two years after its root cause was disclosed and two weeks after exploitation came to light. [Read More]
Adobe warned of “critical” code execution flaws that expose both Windows and macOS users to malicious hacker attacks. [Read More]
ICS Patch Tuesday: Siemens and Schneider Electric have released a total of 22 advisories addressing more than 80 vulnerabilities affecting their products. [Read More]
L3 Technologies, a U.S. government contractor that sells aerospace and defense technology, has emerged as a "leading candidate" to acquire Israeli exploit merchant NSO Group. [Read More]
Based on the Adore-Ng rootkit, a new, under-development Linux rootkit dubbed Syslogk is hiding the Rekoobe backdoor on infected systems. [Read More]

FEATURES, INSIGHTS // Vulnerabilities

rss icon

Jim Ivers's picture
Given the observation that consumers still seem oblivious to the risks and the lack of awareness about basic security hygiene, the education push will fall short.
David Holmes's picture
Security researchers found 26 vulnerabilities within ISP network devices that would have given them remote admin access to the majority of home networks in the United States.
David Holmes's picture
A manufacturer of a meter may have a different threat model involving the physical aspects of the device itself: device memory, firmware interface, ecosystem communications.
Jim Ivers's picture
These recommendations will help your organization reduce risk and save real money on the cost of resolving defects. It is not often you get such a clear win-win scenario.
Dan Cornell's picture
Being able to properly defend applications requires organizations to first identify their attack surfaces before meaningful risk management can take place.
Marie Hattar's picture
When done successfully, continuous testing and training prevents bugs and performance issues from going out the door, while enabling developers to better spot problems in the future.
Travis Greene's picture
To reduce exposure to malware, security teams need to learn the DevOps techniques that are being adopted across the rest of the IT organization.
Jim Ivers's picture
Medical devices are indeed vulnerable to attack, but the industry is waking up to the breadth of the problems, and several organizations are forming a vanguard to show the way forward.
Jennifer Blatnik's picture
If the WannaCry incident taught us anything, it’s that global, widespread ransomware can and will impact organizations without any notice. The time to prepare is now.
Torsten George's picture
Hackers are exploiting known vulnerabilities and are betting on the fact that organizations don’t know how to fix what really matters.