Security Experts:

Virus & Threats
long dotted


DLL hijacking vulnerabilities that can be exploited for whitelisting bypass, persistence and privilege escalation have been patched in Trend Micro Password Manager. [Read More]
Key negotiation attack (KNBO) gives attackers the ability to decrypt all of the traffic between vulnerable Bluetooth devices during a session. [Read More]
SAP on Tuesday patched three critical (Hot News) vulnerabilities in its products, the highest number of critical flaws fixed on the same day since 2014. [Read More]
British Airways (BA) has been criticized for allowing hackers easy access to customer flight information via a vulnerability affecting its e-ticketing system. [Read More]
Microsoft alerts users that its latest security updates patch more BlueKeep-like, wormable vulnerabilities affecting Remote Desktop Services. [Read More]
Researchers at Google and Netflix discover 8 DoS vulnerabilities affecting various HTTP/2 implementations, including from Amazon, Apple, Facebook and Microsoft. [Read More]
Siemens SCALANCE X industrial switches are vulnerable to DoS attacks, but patches have yet to be released. [Read More]
More than 750,000 systems remain vulnerable to the BlueKeep vulnerability as patching rate has decreased by around 85%, a new report from security firm BitSight reveals. [Read More]
Microsoft’s August 2019 Patch Tuesday updates fix over 90 vulnerabilities, but none of them have been exploited in attacks or disclosed publicly before the patches were released. [Read More]
Adobe has patched 118 vulnerabilities across its After Effects, Character Animator, Premiere Pro, Prelude, Creative Cloud, Acrobat and Reader, Experience Manager and Photoshop products. [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

David Holmes's picture
Architects and IT security teams are looking for technology evolutions to help them manage real problems in endpoint storage and messaging.
Josh Lefkowitz's picture
Regardless of which framework you use, it’s crucial to operationalize it in the context of your organization’s unique environment and risk factors.
Devon Kerr's picture
Devon Kerr explains what happened when a municipality inadvertently deployed a brand-new endpoint protection technology across a small part of their production network.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Ashley Arbuckle's picture
By learning from the past there are many steps we can take to strength our approach to security as attackers continue to turn to email to help accomplish their mission.
Siggi Stefnisson's picture
“Evasive phishing" is not a term much heard, but we all will—and need to—start talking a lot more about it than we have in the past.
Alastair Paterson's picture
BEC is becoming increasingly profitable for threat actors as organizations are making it easy for adversaries to gain access to the valuable information that sits within these inboxes.
Siggi Stefnisson's picture
We should be thinking about how users work, what they do and how it affects the security posture of the business, but does security really start with them?
Torsten George's picture
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.
Marc Solomon's picture
Recalculating and reevaluating priorities based on a continuous flow of new data, learnings and your risk profile, helps to ensure you’re staying focused on what matters in a highly dynamic environment.