Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

Several PoC exploits, including ones that can be used for remote code execution, have been created for the recently patched Windows RDS vulnerability tracked as CVE-2019-0708 and dubbed BlueKeep. [Read More]
Several Critical vulnerabilities were found in 10 South Korean ActiveX controls as part of a short research project, security researchers with Risk Based Security reveal. [Read More]
A vulnerability in Mitsubishi Electric MELSEC-Q PLCs exposes devices to remote DoS attacks. [Read More]
Autonomous threat hunting company Hunters.AI emerges from stealth mode with $5.4 million in seed funding. [Read More]
The European Union on Friday adopted powers to punish those outside the bloc who launch cyberattacks that cripple hospitals and banks, sway elections and steal company secrets or funds. [Read More]
Researcher known as SandboxEscaper drops yet another Windows zero-day exploit. This time it’s for a local privilege escalation (LPE) flaw affecting Windows 10. [Read More]
Google on Tuesday said that some customer passwords for its G Suite customers were stored in an unhashed format since 2005. [Read More]
Mozilla has released Firefox 67 to the stable channel with improved protection against tracking and with fingerprinting and crypto-mining protection capabilities. [Read More]
Microsoft has added live response capabilities in Microsoft Defender ATP to help security teams more easily investigate incidents on remote machines. [Read More]
Washington has warned that Chinese-made drones could be giving spy agencies in Beijing "unfettered access" to stolen data, according to a report in American media. [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Ashley Arbuckle's picture
By learning from the past there are many steps we can take to strength our approach to security as attackers continue to turn to email to help accomplish their mission.
Siggi Stefnisson's picture
“Evasive phishing" is not a term much heard, but we all will—and need to—start talking a lot more about it than we have in the past.
Alastair Paterson's picture
BEC is becoming increasingly profitable for threat actors as organizations are making it easy for adversaries to gain access to the valuable information that sits within these inboxes.
Siggi Stefnisson's picture
We should be thinking about how users work, what they do and how it affects the security posture of the business, but does security really start with them?
Torsten George's picture
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.
Marc Solomon's picture
Recalculating and reevaluating priorities based on a continuous flow of new data, learnings and your risk profile, helps to ensure you’re staying focused on what matters in a highly dynamic environment.
Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.
Siggi Stefnisson's picture
Ninety percent of breaches may begin with an email, but today most of the action happens well after an inbound email has been scanned and delivered.
Torsten George's picture
Application Programming Interfaces (APIs) provide hackers with multiple venues to access an organization’s data and can even be used to cause massive business disruptions.