Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

U.S. Office of Personnel Management (OPM) has improved its security posture since the data breaches disclosed in 2015, but many issues are still unresolved, GAO says in a report [Read More]
Researchers disclose 7 new Meltdown and Spectre attack methods. They claim existing mitigations are not effective, but Intel disagrees [Read More]
iPhone X and Xiaomi Mi 6 were again hacked at Pwn2Own Tokyo. This year researchers earned a total of over $300,000 [Read More]
Siemens has released 7 advisories to warn users of potentially serious vulnerabilities affecting various SIMATIC and SCALANCE products [Read More]
Windows zero-day fixed by Microsoft with its November 2018 Patch Tuesday updates (CVE-2018-8589) used by an APT group in attacks aimed at the Middle East [Read More]
Microsoft fixes over 60 vulnerabilities with November 2018 Patch Tuesday updates, including zero-days and publicly disclosed flaws [Read More]
Adobe releases Patch Tuesday updates for Flash Player, Acrobat and Reader, and Photoshop CC to address three vulnerabilities, including one for which a PoC is public [Read More]
SAP has published its November 2018 set of security patches, which include 11 new Security Patch Day Notes, along with 3 updates for previously released notes. [Read More]
White hat hackers hack iPhone X, Samsung Galaxy S9 and Xiaomi Mi 6 at Pwn2Own Tokyo [Read More]
A security researcher recently discovered that it is possible to bypass Windows’ User Account Control (UAC) by spoofing the execution path of a file in a trusted directory. [Read More]

FEATURES, INSIGHTS // Vulnerabilities

rss icon

Marc Solomon's picture
Recalculating and reevaluating priorities based on a continuous flow of new data, learnings and your risk profile, helps to ensure you’re staying focused on what matters in a highly dynamic environment.
Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.
Torsten George's picture
Application Programming Interfaces (APIs) provide hackers with multiple venues to access an organization’s data and can even be used to cause massive business disruptions.
Torsten George's picture
Microservices and containers enable faster application delivery and improved IT efficiency. However, the adoption of these technologies has outpaced security.
Oliver Rochford's picture
We can’t rely on our own governments to practice responsible full disclosure. Full Disclosure is compromised. We can’t really blame them. Either everyone discloses, or no-one does.
Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.
Travis Greene's picture
As DevOps and agile development methodologies take greater root in the enterprise, the traditional tools and approaches for eliminating vulnerabilities in code will no longer be able to keep pace.
Dan Cornell's picture
When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the various testing approach options.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.
Lance Cottrell's picture
Laws to support swift and automatic updates for all devices, and consequence to organizations that fail to ensure their IoT devices are secure, would be a big step forward for IoT security.