Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

Beijing calls the latest US warning against using Huawei equipment "groundless", as the Chinese telecom giant faces espionage fears in a growing number of countries. [Read More]
SAP's February 2019 security updates address over a dozen vulnerabilities across its product portfolio, including a Hot News flaw in SAP HANA Extended Application Services. [Read More]
Researchers demonstrate that Intel’s SGX technology can be abused to hide an advanced piece of malware that can allow attackers to steal data and conduct activities on the victim’s behalf. [Read More]
One of the many vulnerabilities patched by Microsoft with its February 2019 Patch Tuesday updates is an Internet Explorer zero-day which Google says has been exploited in attacks. [Read More]
Email provider VFEmail was hit by a destructive attack, where a hacker who accessed its network was able to erase its servers in the United States, including the backup systems. [Read More]
Adobe patches over 70 vulnerabilities in Acrobat and Reader products, including a critical data leakage issue whose details were made public in January. [Read More]
One day before Adobe’s monthly security updates, a third-party fix has been released for an Adobe Reader vulnerability revealed several weeks ago. [Read More]
A vulnerability in the latest macOS release could allow a malicious application to access restricted Safari data, an application developer has discovered. [Read More]
A vulnerability in the runc container runtime could allow malicious containers to achieve root-level code execution on the host. AWS, Google Cloud and Linux distributions are affected. [Read More]
Bot protection firm PerimeterX raises $43 million in a Series C funding round, which brings the total raised by the company to over $77 million. [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Oliver Rochford's picture
We can’t rely on our own governments to practice responsible full disclosure. Full Disclosure is compromised. We can’t really blame them. Either everyone discloses, or no-one does.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Jack Danahy's picture
To mitigate the risk of attacks, IT teams should disable unused tools and components, while deploying endpoint protection that doesn’t rely solely on file scanning or whitelisting.
Markus Jakobsson's picture
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.
Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.
Travis Greene's picture
As DevOps and agile development methodologies take greater root in the enterprise, the traditional tools and approaches for eliminating vulnerabilities in code will no longer be able to keep pace.
Dan Cornell's picture
When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the various testing approach options.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.
Lance Cottrell's picture
Laws to support swift and automatic updates for all devices, and consequence to organizations that fail to ensure their IoT devices are secure, would be a big step forward for IoT security.
Jim Ivers's picture
With a software composition analysis (SCA) tool in place, security teams can quickly scan an information repository and know where vulnerable software is being used.