Security Experts:

Virus & Threats
long dotted


MITRE, CyManII and the US government have teamed up for a special interest group whose goal is to enhance cyber defenses for ICS and OT. [Read More]
Apple has released updates to patch tens of vulnerabilities across its operating systems, and it has finally released a macOS Big Sur and Catalina patch for two exploited vulnerabilities. [Read More]
Researchers at NCC Group create a tool for conducting a new type of Bluetooth Low Energy (BLE) relay attack that bypasses existing protections. [Read More]
A new variant of the botnet attempts to exploit a critical vulnerability in Spring Cloud Gateway. [Read More]
A high-severity vulnerability resolved in SonicWall SMA1000 series appliances could lead to unauthorized access. [Read More]
CISA has temporarily removed the Windows vulnerability known as PetitPotam from its Must-Patch list after learning from Microsoft that a recent patch can cause authentication failures. [Read More]
Exploitation attempts targeting the Zyxel firewall vulnerability tracked as CVE-2022-30525 started one day after disclosure. [Read More]
More than 20 would-be hackers gathered in the Brazilian electoral authority’s headquarters in the capital this week. Their mission: infiltrate the nation’s voting system ahead of a hotly anticipated race in October. [Read More]
New research find the Iran-linked hacking group OilRig using a new backdoor in an attack against a government official within Jordan’s foreign ministry. [Read More]
A DoS vulnerability can be exploited to make Siemens building automation controllers unavailable for days, experts warn. [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Keith Ibarguen's picture
As email security is an ever-changing landscape, focusing on the most relevant issues in the threat landscape is where organizations need to start.
William Lin's picture
Most organizations want to adopt DevSecOps practices, but their current practices are closer to traditional waterfall methodologies than the agile practices described in this DevSecOps manifesto.
Marc Solomon's picture
XDR architecture must be broad and deep so that organizations can get the most value out of their existing best-of-breed security solutions, including their free, open-source tools.
Jeff Orloff's picture
Armed with the right cyber defense strategy, tools, and security controls, organizations can defend themselves against ransomware attacks.
Joshua Goldfarb's picture
The strategies used by attackers and fraudsters to profit from cryptocurrency are not new. Here are five steps end-users can take to protect themselves.
Marc Solomon's picture
If you are among the growing group of organizations looking to an MDR provider to supplement your security operations with XDR, make sure you consider these three factors.
Keith Ibarguen's picture
Leverage the power of the collective - the network effect – for its ever-evolving intelligence wherever possible to keep your employees free of all the bad stuff that has made it to their inboxes.
Marc Solomon's picture
The goal of XDR is detection and response across the infrastructure, across all attack vectors, across different vendors, and across security technologies that are cloud based and on premises.
Laurence Pitt's picture
Cybersecurity Awareness Month is an excellent time to reflect on any changes made, and that might still need to be made since, as for many people hybrid has become the working ‘normal.’
Keith Ibarguen's picture
Far too many engineers in the trenches don’t take the time to lift their heads to see context, so when good (and bad) things happen, this is a great management opportunity that you should take full advantage of.