Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

ZombieLoad, RIDL and Fallout: Intel processors are vulnerable to more speculative execution side-channel attacks that can allow malware to obtain sensitive data. [Read More]
Twitter warned that a bug in Twitter for iOS led to the company inadvertently collecting location data and sharing it with a third-party. [Read More]
Adobe patches a critical vulnerability in Flash Player and over 80 flaws in its Acrobat products. [Read More]
Facebook will soon kick off its first global Capture the Flag (CTF) competition, set to take place between June 1 and 3, 2019, [Read More]
Security updates Apple released this week for iOS, macOS, Safari, tvOS and watchOS include patches for 21 vulnerabilities that affect open source web browser engine WebKit. [Read More]
A use-after-free vulnerability in SQLite could be exploited by an attacker to remotely execute code on a vulnerable machine, Cisco Talos security researchers warn. [Read More]
Siemens’ May 2019 Patch Tuesday advisories address over a dozen vulnerabilities, including serious flaws affecting LOGO and SINAMICS Perfect Harmony products. [Read More]
New Citizens Lab report details Iran-linked multilingual campaign aimed at seeding anti-Saudi, anti-Israel and anti-American stories across the internet. [Read More]
Facebook patches a serious WhatsApp zero-day vulnerability (CVE-2019-3568) that can and has been exploited to remotely install spyware on phones by calling the targeted device. [Read More]
A North Korea-linked hacker group tracked as ScarCruft, APT37 and Group123 continues to evolve and it recently added a Bluetooth harvester to its toolkit. [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

John Maddison's picture
It is essential to understand exactly what is meant by machine learning so you can quickly differentiate between those solutions that actually provide the technology you need to stay ahead in the cyber war arms race, and those capitalizing on market hype.
Torsten George's picture
Microservices and containers enable faster application delivery and improved IT efficiency. However, the adoption of these technologies has outpaced security.
Oliver Rochford's picture
We can’t rely on our own governments to practice responsible full disclosure. Full Disclosure is compromised. We can’t really blame them. Either everyone discloses, or no-one does.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Jack Danahy's picture
To mitigate the risk of attacks, IT teams should disable unused tools and components, while deploying endpoint protection that doesn’t rely solely on file scanning or whitelisting.
Markus Jakobsson's picture
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.
Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.
Travis Greene's picture
As DevOps and agile development methodologies take greater root in the enterprise, the traditional tools and approaches for eliminating vulnerabilities in code will no longer be able to keep pace.
Dan Cornell's picture
When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the various testing approach options.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.