Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

Cryptographers at Swiss university ETH Zurich have found at least five exploitable security flaws in the privacy-themed MEGA cloud storage service [Read More]
Mainly focused on intellectual property theft and cyberespionage, the state-sponsored hacking group was seen deploying a broad range of ransomware families. [Read More]
The ICS vendors whose products are affected by the OT:Icefall vulnerabilities have started releasing advisories. [Read More]
A vulnerability in the SMA Technologies OpCon UNIX agent results in the same SSH key being added to all installations. [Read More]
Aqua Security releases open source tool for auditing the software supply chain to ensure compliance with newly created CIS guidelines. [Read More]
Chrome 103 patches nine externally reported vulnerabilities, including a critical-severity use-after-free bug in Base. [Read More]
The behavior is linked to Acrobat Reader’s use of Chromium Embedded Framework (CEF), which has some incompatibility issues with certain security solutions. [Read More]
Industry professionals comment on the disclosure of OT:Icefall, a collection of 56 vulnerabilities affecting ICS products from 10 major companies. [Read More]
Cyberint, a threat intelligence startup competing in the attack surface management category, has raised $40 million in financing led by StageOne Late Stage Arm. [Read More]
SYN Ventures is leading a $23 million Series A investment in RevealSecurity, a startup building technology to thwart malicious insider threats. [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Torsten George's picture
Digital experience monitoring technology goes beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.
Keith Ibarguen's picture
As email security is an ever-changing landscape, focusing on the most relevant issues in the threat landscape is where organizations need to start.
William Lin's picture
Most organizations want to adopt DevSecOps practices, but their current practices are closer to traditional waterfall methodologies than the agile practices described in this DevSecOps manifesto.
Marc Solomon's picture
XDR architecture must be broad and deep so that organizations can get the most value out of their existing best-of-breed security solutions, including their free, open-source tools.
Jeff Orloff's picture
Armed with the right cyber defense strategy, tools, and security controls, organizations can defend themselves against ransomware attacks.
Joshua Goldfarb's picture
The strategies used by attackers and fraudsters to profit from cryptocurrency are not new. Here are five steps end-users can take to protect themselves.
Marc Solomon's picture
If you are among the growing group of organizations looking to an MDR provider to supplement your security operations with XDR, make sure you consider these three factors.
Keith Ibarguen's picture
Leverage the power of the collective - the network effect – for its ever-evolving intelligence wherever possible to keep your employees free of all the bad stuff that has made it to their inboxes.
Marc Solomon's picture
The goal of XDR is detection and response across the infrastructure, across all attack vectors, across different vendors, and across security technologies that are cloud based and on premises.
Laurence Pitt's picture
Cybersecurity Awareness Month is an excellent time to reflect on any changes made, and that might still need to be made since, as for many people hybrid has become the working ‘normal.’