Security Experts:

Virus & Threats
long dotted


A China-linked cyber espionage group used new backdoors in an attack aimed at a company that provides services to the UK government [Read More]
Cisco has released software updates to address a hard-coded password vulnerability in Cisco Prime Collaboration Provisioning (PCP) Software. [Read More]
Attacks carried out by the Russian group Sofacy (Fancy Bear/APT28) overlap with campaigns conducted by Turla and actors linked to China and the U.S. [Read More]
Slingshot is a sophisticated cyber espionage campaign that targets entities in the Middle East and Africa via routers, and the group behind the operation apparently speaks English [Read More]
IOActive security researchers today revealed a ransomware attack on robots, demonstrating not only that such assaults are possible, but also the potential financial impact [Read More]
CIGslip is a new attack vector that relies on manipulating the manner in which CIG functions, thus bypassing its controls without the need to inject unsigned image code pages into memory. [Read More]
Researchers showed how Cortana could have been abused to bypass the Windows lock screen and hack into enterprise systems. Microsoft released a patch, but variations of the attack may still be possible and other voice assistants could also be affected [Read More]
Investigation into the September 2017 CCleaner incident reveals what appears to be a stage 3 payload that attackers supposedly intended to deliver to infected users [Read More]
The hackers behind the recent Olympic Destroyer attack planted sophisticated false flags inside their malware in an effort to confuse investigators [Read More]
Web application scanner company Netsparker has raised $40 million from San Francisco-based growth and private equity firm Turn/River. [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Josh Lefkowitz's picture
Oil and gas is one of the critical infrastructure sectors that face greater risks and challenges when it comes to security
Jennifer Blatnik's picture
One of the crucial benefits of blockchain is its distributed capabilities, which mean there isn’t one centralized target to hack.
Jim Ivers's picture
Given the observation that consumers still seem oblivious to the risks and the lack of awareness about basic security hygiene, the education push will fall short.
David Holmes's picture
Security researchers found 26 vulnerabilities within ISP network devices that would have given them remote admin access to the majority of home networks in the United States.
David Holmes's picture
A manufacturer of a meter may have a different threat model involving the physical aspects of the device itself: device memory, firmware interface, ecosystem communications.
Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”
Jim Ivers's picture
These recommendations will help your organization reduce risk and save real money on the cost of resolving defects. It is not often you get such a clear win-win scenario.
Dan Cornell's picture
Being able to properly defend applications requires organizations to first identify their attack surfaces before meaningful risk management can take place.
Marie Hattar's picture
When done successfully, continuous testing and training prevents bugs and performance issues from going out the door, while enabling developers to better spot problems in the future.
Jack Danahy's picture
It seems as though competing vendors spend more of their marketing dollars describing the insufficiency of existing solutions than they do explaining the added value that their new advancements bring.