Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

Malicious actors exploiting the Drupal vulnerability tracked as CVE-2018-7600 and dubbed Drupalgeddon2 to deliver backdoors, cryptocurrency miners and other malware [Read More]
CrowdStrike unveils new Falcon Endpoint Protection Complete solution and a threat analysis subscription module for the Falcon platform [Read More]
Trend Micro unveils Writing Style DNA, an AI-powered capability that uses writing style analysis to detect business email compromise (BEC) attacks [Read More]
IBM releases Adversarial Robustness Toolbox, an open source software library designed to help researchers and developers secure artificial intelligence (AI) systems [Read More]
A technical alert issued by the US and UK details how Russian state-sponsored hackers target government and private-sector organizations by abusing various networking protocols [Read More]
Intel announces new silicon-level security, including threat detection technology and a framework that standardizes security features built into processors, and a strategic collaboration with Purdue University [Read More]
Cisco has launched new email security services to protect users from email attacks, as well as new capabilities to protect devices from ransomware, cryptomining, and fileless malware. [Read More]
Symantec is releasing its own targeted attack analytics (TAA) tool to existing Symantec Advanced Threat Protection (ATP) customers free of additional charge. [Read More]
There is a good chance that your Android phone doesn’t have all of the security patches that it should, as vendors regularly omit some vulnerability fixes, security researchers have discovered. [Read More]
Cisco Talos researchers find 17 vulnerabilities in Moxa industrial routers, including many high severity command injection and DoS flaws [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Jack Danahy's picture
With all of our collective focus on machine learning, we simply can’t overlook human learning’s critical role in guarding against attack and protecting the organization.
Torsten George's picture
We need to consider whether traditional approaches to vulnerability management are still viable and if just upgrading existing methods or tools is sufficient.
Jalal Bouhdada's picture
Vendors, practitioners and security experts must all work closely together to combat the well-funded actors who pose a threat to medical devices.
Jim Ivers's picture
Why are even the most security-conscious organizations being compromised, and what does it mean for everyone else?
David Holmes's picture
DUHK and ROCA are both implementation-specific vulnerabilities concerning one of my favorite topics, random number generators.
Torsten George's picture
The end user community is at the mercy of security researchers to act responsibly in order to limit the potential for their findings to be used for malicious purposes.
Markus Jakobsson's picture
If a particular product blocks 99% of all threats, that probably means that product fails to detect the most dangerous threat: targeted attacks.
Scott Simkin's picture
Just as there should be consistency across network, endpoint and cloud security, there should be the same consistency in identification, prevention, policy and enforcement of that policy for IoT security.
Alastair Paterson's picture
With greater awareness about POS system attacks, operations against third-party suppliers, and the vulnerabilities of public or semi-public Wi-Fi networks, companies can do a lot to mitigate risk and ensure safer journeys for travelers.
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security