Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

Fake checkra1n iOS jailbreak used as part of a sophisticated click fraud scheme that could pave the way for far more malicious actions. [Read More]
ESET researchers identify a new backdoor associated with the threat actor known as the Winnti Group. [Read More]
Microsoft is now providing all of its Defender ATP customers with tamper protection, a feature meant to prevent unauthorized changes. [Read More]
Mozilla announced a reduced attack surface for code injection in Firefox through the removal of potentially dangerous artifacts such as occurrences of inline scripts and eval()-like functions. [Read More]
A critical vulnerability patched by Sophos in its Cyberoam firewall appliances allows a remote, unauthenticated attacker to execute arbitrary commands with root privileges. [Read More]
The [email protected] Browser, the old technology that allows Simjacker attacks on mobile phones, is still deployed by 61 mobile operators across 29 countries. [Read More]
Private equity firm Thoma Bravo has made an offer to acquire UK-based cybersecurity firm Sophos for $3.9 billion. [Read More]
A recently uncovered highly targeted cyber-espionage platform that uses Tor for network communication has been targeting Russia and Eastern Europe. [Read More]
Google patches 8 vulnerabilities in Chrome 77, including 5 flaws that have earned researchers $45,000. [Read More]
The National Institute of Standards and Technology (NIST) and Microsoft announced a joint effort aimed at helping enterprises improve their patching strategies. [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Torsten George's picture
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.
Marc Solomon's picture
Recalculating and reevaluating priorities based on a continuous flow of new data, learnings and your risk profile, helps to ensure you’re staying focused on what matters in a highly dynamic environment.
Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.
Siggi Stefnisson's picture
Ninety percent of breaches may begin with an email, but today most of the action happens well after an inbound email has been scanned and delivered.
Torsten George's picture
Application Programming Interfaces (APIs) provide hackers with multiple venues to access an organization’s data and can even be used to cause massive business disruptions.
John Maddison's picture
It is essential to understand exactly what is meant by machine learning so you can quickly differentiate between those solutions that actually provide the technology you need to stay ahead in the cyber war arms race, and those capitalizing on market hype.
Torsten George's picture
Microservices and containers enable faster application delivery and improved IT efficiency. However, the adoption of these technologies has outpaced security.
Oliver Rochford's picture
We can’t rely on our own governments to practice responsible full disclosure. Full Disclosure is compromised. We can’t really blame them. Either everyone discloses, or no-one does.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Jack Danahy's picture
To mitigate the risk of attacks, IT teams should disable unused tools and components, while deploying endpoint protection that doesn’t rely solely on file scanning or whitelisting.