Security Experts:

Virus & Threats
long dotted


Vulnerabilities found by researchers in an oscilloscope from Siglent can be exploited by hackers to tamper with measurements. [Read More]
A security flaw recently discovered in Google’s Monorail open-source issue tracker could be exploited to perform a Cross-Site Search (XS-Search) attack, a security researcher reveals. [Read More]
NATO running Cyber Coalition 2018, the alliance's biggest cyber warfare exercise [Read More]
Hackers are looking to compromise millions of machines behind the vulnerable routers by leveraging the NSA-linked EternalBlue (CVE-2017-0144) and EternalRed (CVE-2017-7494) exploits. [Read More]
MITRE's ATT&CK framework has been used to evaluate enterprise security products from Carbon Black, CrowdStrike, CounterTack, Endgame, Microsoft, RSA and SentinelOne against a simulated attack launched by APT3 [Read More]
Potentially serious vulnerability affecting the Zoom conferencing application can allow an attacker to hijack screen controls, spoof chat messages, and kick attendees off a session [Read More]
No money was paid and no information was lost during a ransomware cyberattack that exploited a cloud-based vulnerability in the Colorado Department of Transportation's computer network last spring, officials said. [Read More]
Cisco has fixed a vulnerability in the web framework code of Cisco Prime License Manager that could allow an attacker to execute arbitrary SQL queries. [Read More]
Researchers introduce smart greybox fuzzing, a new method for finding vulnerabilities in libraries that parse complex files. A fuzzer they developed discovered over 40 flaws [Read More]
Dell resets user passwords for after detecting an attempt to steal customer information, including names, addresses and hashed passwords [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Jack Danahy's picture
To mitigate the risk of attacks, IT teams should disable unused tools and components, while deploying endpoint protection that doesn’t rely solely on file scanning or whitelisting.
Markus Jakobsson's picture
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.
Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.
Travis Greene's picture
As DevOps and agile development methodologies take greater root in the enterprise, the traditional tools and approaches for eliminating vulnerabilities in code will no longer be able to keep pace.
Dan Cornell's picture
When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the various testing approach options.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.
Lance Cottrell's picture
Laws to support swift and automatic updates for all devices, and consequence to organizations that fail to ensure their IoT devices are secure, would be a big step forward for IoT security.
Jim Ivers's picture
With a software composition analysis (SCA) tool in place, security teams can quickly scan an information repository and know where vulnerable software is being used.
David Holmes's picture
The "Reaper" IoT botnet is holding itself up as a blinky light in front of our faces, reminding the InfoSec community that we really need to get ahead of IoT madness.