Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

Kaspersky Lab researchers have analyzed DarkPulsar, another exploit supposedly stolen from the NSA-linked Equation Group [Read More]
Thousands of projects are possibly impacted by a jQuery File Upload plugin vulnerability that has been actively exploited in the wild [Read More]
A China-linked cyber espionage group known as Tick was observed using the Datper malware in a recent campaign [Read More]
Over a dozen vulnerabilities, including remote code execution and DoS flaws, have been found in FreeRTOS. The microcontroller OS is used for consumer products, B2B solutions and industrial automation [Read More]
EU leaders on Thursday condemned the attempted hack on the global chemical weapons watchdog and vowed to step up the bloc's efforts to tackle cyber attacks [Read More]
Several vulnerabilities patched in Drupal 7 and 8, including two ‘critical’ remote code execution vulnerabilities [Read More]
Several vulnerabilities, including ones rated high severity, have been patched in Splunk Enterprise and Splunk Light [Read More]
Celia/VGo telepresence robots from Vecna are affected by several vulnerabilities [Read More]
NFCdrip attack shows that NFC can be used for long-range exfiltration. Passwords and other data can be quickly stolen over tens of meters [Read More]
A recently observed cyber-espionage campaign targeting South Korea, the United States and Canada is reusing malicious code previously associated with state-sponsored Chinese group APT1 [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Torsten George's picture
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.
Marc Solomon's picture
Recalculating and reevaluating priorities based on a continuous flow of new data, learnings and your risk profile, helps to ensure you’re staying focused on what matters in a highly dynamic environment.
Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.
Siggi Stefnisson's picture
Ninety percent of breaches may begin with an email, but today most of the action happens well after an inbound email has been scanned and delivered.
Torsten George's picture
Application Programming Interfaces (APIs) provide hackers with multiple venues to access an organization’s data and can even be used to cause massive business disruptions.
John Maddison's picture
It is essential to understand exactly what is meant by machine learning so you can quickly differentiate between those solutions that actually provide the technology you need to stay ahead in the cyber war arms race, and those capitalizing on market hype.
Torsten George's picture
Microservices and containers enable faster application delivery and improved IT efficiency. However, the adoption of these technologies has outpaced security.
Oliver Rochford's picture
We can’t rely on our own governments to practice responsible full disclosure. Full Disclosure is compromised. We can’t really blame them. Either everyone discloses, or no-one does.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Jack Danahy's picture
To mitigate the risk of attacks, IT teams should disable unused tools and components, while deploying endpoint protection that doesn’t rely solely on file scanning or whitelisting.