Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

The company will use the investment to expand marketing and sales initiatives and accelerate product roadmap. [Read More]
An Indian media conglomerate, a police department and the agency responsible for the country’s national identification database have been hacked, likely by a state-sponsored Chinese group. [Read More]
The vulnerabilities could be exploited to execute arbitrary code remotely, cause a denial of service condition, or manipulate device configuration. [Read More]
The internet is already being scanned for VMware vCenter servers affected by CVE-2021-22005, a critical vulnerability patched just days ago. [Read More]
Adversaries used malicious documents targeting the MSHTML vulnerability tracked as CVE-2021-40444 to compromise Russian state rocket center and interior ministry. [Read More]
CISA has issued an alert on the Conti ransomware, just as a second major U.S. farming cooperative confirmed being hit by ransomware. [Read More]
Netgear warns that an attacker on the same network as a vulnerable device could intercept and manipulate router traffic to execute code as root. [Read More]
More than 70 Hikvision cameras and NVRs are affected by a critical vulnerability that can allow an attacker to take control of devices without user interaction. [Read More]
The vulnerability could be triggered when the victim opens a malicious WorkSpaces URI from the browser. [Read More]
Hundreds of thousands of Windows domain and application credentials leaked due to a flaw related to the Autodiscover protocol used by Microsoft Exchange. [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Keith Ibarguen's picture
Far too many engineers in the trenches don’t take the time to lift their heads to see context, so when good (and bad) things happen, this is a great management opportunity that you should take full advantage of.
Marc Solomon's picture
Enterprises can't rely on Endpoint Protection Platforms (EPP) or Endpoint Detection and Response (EDR) tools to detect suspicious activity on a user’s system to quarantine the system or even to reimage.
Torsten George's picture
As it has become clear that remote/hybrid work is here to stay, IT security practitioners must figure out how to enable a secure and resilient anywhere workforce to minimize their future risk exposure.
Joshua Goldfarb's picture
The question of the importance of the state of a client device is a debate that has been around for a few years in the security field.
Marc Solomon's picture
Evolving our definition of detection to encompass greater breadth and depth of understanding through internal and external data aggregation, correlation and investigation, delivers the information we need to execute faster with confidence.
Keith Ibarguen's picture
Leveraging humans for detection makes it hard for the attackers to predict whether or not their malicious emails will be identified and using technology to automate response provides scale and speed in resolution.
Marc Solomon's picture
If you view XDR as a destination and not a solution, regardless of the path you take, you will need to understand the focus and core competencies of each vendor,
Marc Solomon's picture
Extended Detection and Response (XDR) is the latest buzz word in the security industry and, as with any new technology development, in the early days there is a lot of confusion.
Torsten George's picture
Self-healing cybersecurity systems represent a major security and IT productivity advancement, allowing organizations to streamline the management and protection of today’s highly distributed infrastructures.
Marie Hattar's picture
Security is never static, and networks will always be evolving, so make sure you’re continuously validating your security posture and ready for whatever comes next.