Security Experts:

Virus & Threats
long dotted


Microsoft revealed plans to offer paid Windows 7 Extended Security Updates (ESU) for three years after traditional support for the operating system officially ends. [Read More]
US charges North Korean national for Lazarus Group attacks, including the 2014 Sony hack, the $81 million Bangladesh Bank heist, the WannaCry ransomware attack, and targeting of US defense contractors [Read More]
Some of the USB flash drives shipped by Schneider Electric with its Conext Combox and Conext Battery Monitor solar energy products found to contain malware [Read More]
Effective this week, Windows XP is no longer supported in Firefox. More than four years after Microsoft stopped supporting the platform, Mozilla is making a similar move. [Read More]
A vulnerability affecting some of Schneider Electric’s Modicon controllers can be exploited by malicious actors to cause significant disruption in ICS networks, researchers warn [Read More]
Cisco patches critical and high severity vulnerabilities in its RV series, SD-WAN, Umbrella and other products [Read More]
Opsview recently addressed a series of remote code-execution, command-execution and local privilege-escalation vulnerabilities in the Opsview Monitor. [Read More]
Google celebrates 10 years of its Chrome web browser with the release of a new version that provides users with security improvements, new features, and patches for 40 vulnerabilities. [Read More]
Windows zero-day vulnerability exploited by a group dubbed 'PowerPool' in targeted attacks. Flaw leveraged to elevate privileges of second-stage malware [Read More]
Mobile Pwn2Own renamed Pwn2Own Tokyo after ZDI adds IoT category, which includes Apple Watch, Amazon Echo, Google Home, Nest Cam IQ Indoor and Amazon Cloud Cam [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Jim Ivers's picture
Why are even the most security-conscious organizations being compromised, and what does it mean for everyone else?
David Holmes's picture
DUHK and ROCA are both implementation-specific vulnerabilities concerning one of my favorite topics, random number generators.
Torsten George's picture
The end user community is at the mercy of security researchers to act responsibly in order to limit the potential for their findings to be used for malicious purposes.
Markus Jakobsson's picture
If a particular product blocks 99% of all threats, that probably means that product fails to detect the most dangerous threat: targeted attacks.
Alastair Paterson's picture
With greater awareness about POS system attacks, operations against third-party suppliers, and the vulnerabilities of public or semi-public Wi-Fi networks, companies can do a lot to mitigate risk and ensure safer journeys for travelers.
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Josh Lefkowitz's picture
Oil and gas is one of the critical infrastructure sectors that face greater risks and challenges when it comes to security
Jennifer Blatnik's picture
One of the crucial benefits of blockchain is its distributed capabilities, which mean there isn’t one centralized target to hack.
Jim Ivers's picture
Given the observation that consumers still seem oblivious to the risks and the lack of awareness about basic security hygiene, the education push will fall short.
David Holmes's picture
Security researchers found 26 vulnerabilities within ISP network devices that would have given them remote admin access to the majority of home networks in the United States.