Security Experts:

Virus & Threats
long dotted


Rapid7 adds automation and orchestration capabilities to its Insight Platform, and new automation functionality to vulnerability management and incident response tools [Read More]
U.S. Department of Defense releases new cyber strategy, which supersedes the 2015 strategy, and the focus is on Russia and China [Read More]
Foreign government hackers continue to target the personal email accounts of U.S. senators and their aides — and the Senate’s security office has refused to defend them, lawmaker says [Read More]
Adobe patches 7 vulnerabilities in Acrobat and Reader, including a critical code execution flaw [Read More]
The recent Click2Gov attacks, which have targeted several cities in the U.S., are apparently carried out by a previously unknown financially motivated group [Read More]
Global ransomware attacks are increasingly linked to nation states, with the lines between politics and crime often blurring, Europol says [Read More]
Fidelis Cybersecurity raises $25 million in growth capital. The new funds will be used to extend product innovation, support business growth, and invest into MDR service [Read More]
A newly discovered piece of Linux malware that features both ransomware and crypto-currency mining capabilities appears designed to target enterprise intranets [Read More]
Critical NUUO software vulnerability dubbed Peekaboo could allow attackers to remotely view video feeds and tamper with the recordings of hundreds of thousands of IoT cameras [Read More]
A total of 16 vulnerabilities were addressed with the release of iOS 12, most of which impact only iPhone 5s and later, iPad Air and later, and iPod touch 6th generation. [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Marc Solomon's picture
Recalculating and reevaluating priorities based on a continuous flow of new data, learnings and your risk profile, helps to ensure you’re staying focused on what matters in a highly dynamic environment.
Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.
Siggi Stefnisson's picture
Ninety percent of breaches may begin with an email, but today most of the action happens well after an inbound email has been scanned and delivered.
Torsten George's picture
Application Programming Interfaces (APIs) provide hackers with multiple venues to access an organization’s data and can even be used to cause massive business disruptions.
John Maddison's picture
It is essential to understand exactly what is meant by machine learning so you can quickly differentiate between those solutions that actually provide the technology you need to stay ahead in the cyber war arms race, and those capitalizing on market hype.
Torsten George's picture
Microservices and containers enable faster application delivery and improved IT efficiency. However, the adoption of these technologies has outpaced security.
Oliver Rochford's picture
We can’t rely on our own governments to practice responsible full disclosure. Full Disclosure is compromised. We can’t really blame them. Either everyone discloses, or no-one does.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Jack Danahy's picture
To mitigate the risk of attacks, IT teams should disable unused tools and components, while deploying endpoint protection that doesn’t rely solely on file scanning or whitelisting.
Markus Jakobsson's picture
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.