Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

High severity vulnerability discovered in Siemens SIMATIC S7-400 PLCs can be exploited remotely to cause devices to enter a DoS condition [Read More]
As the adoption of open source components soars, vulnerabilities in this type of software have become increasingly common and they can pose a serious risk to applications, Synopsys study shows [Read More]
Critical vulnerability in the Signal desktop app allowed remote code execution with no user interaction. Researchers show how hackers could have stolen conversations and more [Read More]
Adobe patches nearly 50 vulnerabilities in its Acrobat and Reader products, including critical code execution flaws [Read More]
The integration of new IT networks with older operational technology (OT) networks is introducing new security risks to old technology and old technology practices. [Read More]
EFAIL: researchers say they’ve found ways to steal plain text from emails encrypted with OpenPGP and S/MIME, but some believe the claims are overblown [Read More]
The Electron framework, which has been used to build several highly popular applications, is affected by a flaw that can allow remote code execution [Read More]
One year after the WannaCry ransomware outbreak, the NSA-linked exploit it was using for propagation is still threatening unpatched and unprotected systems, security researchers say. [Read More]
An updated version of Chrome 66 is now available, which addresses a Critical security vulnerability that could allow an attacker to take over a system. [Read More]
Rockwell Automation patches vulnerabilities in Arena simulation software and FactoryTalk Activation Manager [Read More]

FEATURES, INSIGHTS // Vulnerabilities

rss icon

Oliver Rochford's picture
We can’t rely on our own governments to practice responsible full disclosure. Full Disclosure is compromised. We can’t really blame them. Either everyone discloses, or no-one does.
Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.
Travis Greene's picture
As DevOps and agile development methodologies take greater root in the enterprise, the traditional tools and approaches for eliminating vulnerabilities in code will no longer be able to keep pace.
Dan Cornell's picture
When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the various testing approach options.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.
Lance Cottrell's picture
Laws to support swift and automatic updates for all devices, and consequence to organizations that fail to ensure their IoT devices are secure, would be a big step forward for IoT security.
Jim Ivers's picture
With a software composition analysis (SCA) tool in place, security teams can quickly scan an information repository and know where vulnerable software is being used.
David Holmes's picture
The "Reaper" IoT botnet is holding itself up as a blinky light in front of our faces, reminding the InfoSec community that we really need to get ahead of IoT madness.
Torsten George's picture
We need to consider whether traditional approaches to vulnerability management are still viable and if just upgrading existing methods or tools is sufficient.
Jalal Bouhdada's picture
Vendors, practitioners and security experts must all work closely together to combat the well-funded actors who pose a threat to medical devices.