Security Experts:

long dotted


VMware patches privilege escalation and DoS vulnerabilities in Fusion and Workstation products. The company also published an advisory for the recently uncovered speculative execution attack known as Variant 4 [Read More]
Intel, AMD, ARM, IBM, Microsoft and other major tech firms have released updates, mitigations and advisories for two new Meltdown/Spectre speculative execution attacks dubbed Variant 3a and Variant 4 [Read More]
Dell recently addressed a local privilege escalation (LPE) vulnerability in SupportAssist, a tool pre-installed on most of all new Dell devices running Windows. [Read More]
Four vulnerabilities, including ones rated critical and high severity, patched in industrial switches from Phoenix Contact [Read More]
An 18-year-old researcher from Uruguay earned more than $36,000 for finding critical Google App Engine vulnerabilities [Read More]
Drupal websites hacked via the Drupalgeddon2 and Drupalgeddon3 vulnerabilities deliver cryptocurrency miners, RATs and tech support scams [Read More]
Two remotely exploitable vulnerabilities that can be exploited for DoS attacks have been patched in the BIND DNS software [Read More]
A misconfigured server operated by CalAmp, a company offering the backend for a broad range of well-known car alarm systems, provided anyone with access to data and even allowed for account and vehicle takeover. [Read More]
Cisco has found and patched three critical unauthorized access vulnerabilities in Digital Network Architecture (DNA) Center [Read More]
Nearly a dozen vulnerabilities, including critical code execution flaws, patched in Advantech’s WebAccess HMI/SCADA product [Read More]

FEATURES, INSIGHTS // Vulnerabilities

rss icon

Torsten George's picture
Microservices and containers enable faster application delivery and improved IT efficiency. However, the adoption of these technologies has outpaced security.
Oliver Rochford's picture
We can’t rely on our own governments to practice responsible full disclosure. Full Disclosure is compromised. We can’t really blame them. Either everyone discloses, or no-one does.
Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.
Travis Greene's picture
As DevOps and agile development methodologies take greater root in the enterprise, the traditional tools and approaches for eliminating vulnerabilities in code will no longer be able to keep pace.
Dan Cornell's picture
When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the various testing approach options.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.
Lance Cottrell's picture
Laws to support swift and automatic updates for all devices, and consequence to organizations that fail to ensure their IoT devices are secure, would be a big step forward for IoT security.
Jim Ivers's picture
With a software composition analysis (SCA) tool in place, security teams can quickly scan an information repository and know where vulnerable software is being used.
David Holmes's picture
The "Reaper" IoT botnet is holding itself up as a blinky light in front of our faces, reminding the InfoSec community that we really need to get ahead of IoT madness.
Torsten George's picture
We need to consider whether traditional approaches to vulnerability management are still viable and if just upgrading existing methods or tools is sufficient.