Security Experts:

Virus & Threats
long dotted


SAP’s security updates for August 2018 include over two dozen patches, but none of them are for critical vulnerabilities [Read More]
What you need to know about the Foreshadow / L1TF vulnerabilities affecting Intel CPUs, including impact and affected vendor responses [Read More]
Microsoft patches 60 vulnerabilities, including two zero-day flaws affecting Windows and Internet Explorer [Read More]
Researchers discover three more speculative execution vulnerabilities in Intel CPUs. The flaws are tracked as Foreshadow and L1TF and several tech giants have already released advisories, updates and mitigations [Read More]
A vulnerability in Microsoft's Active Directory Federation Services (ADFS) allows any attacker in the same organization with a valid second factor to access any other user's account if they can obtain that user's credentials. [Read More]
Adobe patches nearly a dozen vulnerabilities in Flash Player, the Creative Cloud Desktop Application, Experience Manager, and Acrobat and Reader [Read More]
Researchers disclose details of new attack method that can be used to decrypt communications. Products from Cisco, Huawei, ZyXEL and Clavister are affected [Read More]
U.S. Department of Defense invites experts to hack the Marine Corps in new bug bounty program [Read More]
NetComm patches critical vulnerabilities in 4G LTE Light industrial M2M routers. The flaws can be exploited remotely to completely compromise a device [Read More]
Researchers show how hackers could target urban water utilities through the smart irrigation systems used by their customers [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.
Siggi Stefnisson's picture
Ninety percent of breaches may begin with an email, but today most of the action happens well after an inbound email has been scanned and delivered.
Torsten George's picture
Application Programming Interfaces (APIs) provide hackers with multiple venues to access an organization’s data and can even be used to cause massive business disruptions.
John Maddison's picture
It is essential to understand exactly what is meant by machine learning so you can quickly differentiate between those solutions that actually provide the technology you need to stay ahead in the cyber war arms race, and those capitalizing on market hype.
Torsten George's picture
Microservices and containers enable faster application delivery and improved IT efficiency. However, the adoption of these technologies has outpaced security.
Oliver Rochford's picture
We can’t rely on our own governments to practice responsible full disclosure. Full Disclosure is compromised. We can’t really blame them. Either everyone discloses, or no-one does.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Jack Danahy's picture
To mitigate the risk of attacks, IT teams should disable unused tools and components, while deploying endpoint protection that doesn’t rely solely on file scanning or whitelisting.
Markus Jakobsson's picture
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.
Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.