Security Experts:

Virus & Threats
long dotted


Rapid7 announces release of Metasploit 5.0. The latest major version introduces several new features, improved performance, and extended language support. [Read More]
Juniper Networks patches over 60 vulnerabilities in its Juniper ATP, Junos OS and Junos Space products, including many flaws affecting third-party components. [Read More]
Facebook and Google have partnered to launch BountyCon, a new conference for the researchers interested on discovering and reporting vulnerabilities. [Read More]
Hyatt Hotels, which suffered two payment card breaches in recent years, launches public bug bounty program with rewards of up to $4,000 per vulnerability. [Read More]
Cisco patches critical and high severity DoS vulnerabilities that can be exploited remotely without authentication in its Email Security Appliance. [Read More]
Israeli Prime Minister Benjamin Netanyahu said Wednesday that his country led the world in cyber defence, after a report that an unnamed nation planned to meddle in its upcoming general election. [Read More]
A DNS hijacking campaign targeting government, telecoms and commercial entities around the world has been linked to Iran. [Read More]
Google this week released its first set of monthly security patches for Android in 2019, with fixes for more than two dozen vulnerabilities. [Read More]
Imperva researchers discovered that the powerful packet manipulation tool Scapy is affected by a DoS vulnerability. [Read More]
SAP released its first Security Patch Day for 2019 this week, which includes a total of 11 Security Notes, two of which are rated as Hot News. [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

David Holmes's picture
The "Reaper" IoT botnet is holding itself up as a blinky light in front of our faces, reminding the InfoSec community that we really need to get ahead of IoT madness.
Jack Danahy's picture
With all of our collective focus on machine learning, we simply can’t overlook human learning’s critical role in guarding against attack and protecting the organization.
Torsten George's picture
We need to consider whether traditional approaches to vulnerability management are still viable and if just upgrading existing methods or tools is sufficient.
Jalal Bouhdada's picture
Vendors, practitioners and security experts must all work closely together to combat the well-funded actors who pose a threat to medical devices.
Jim Ivers's picture
Why are even the most security-conscious organizations being compromised, and what does it mean for everyone else?
David Holmes's picture
DUHK and ROCA are both implementation-specific vulnerabilities concerning one of my favorite topics, random number generators.
Torsten George's picture
The end user community is at the mercy of security researchers to act responsibly in order to limit the potential for their findings to be used for malicious purposes.
Markus Jakobsson's picture
If a particular product blocks 99% of all threats, that probably means that product fails to detect the most dangerous threat: targeted attacks.
Alastair Paterson's picture
With greater awareness about POS system attacks, operations against third-party suppliers, and the vulnerabilities of public or semi-public Wi-Fi networks, companies can do a lot to mitigate risk and ensure safer journeys for travelers.
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security