Security Experts:

long dotted


Two serious vulnerabilities found in Honeywell video surveillance systems can be exploited by hackers to take complete control of the system and access video feeds. [Read More]
Security vulnerabilities in some AMD ATI Radeon graphics cards could allow attackers to remotely execute code or cause a denial of service condition, researchers from Cisco Talos have warned. [Read More]
0patch has released a micropatch for the recently disclosed Internet Explorer zero-day vulnerability. The micropatch is free for consumers. [Read More]
An analysis of ICS products has shown that many contain features and functions that have been designed with no security in mind, allowing malicious hackers to abuse them and potentially cause serious damage. [Read More]
Snyk announced a $150 million funding round, at a valuation of more than $1 billion, earning the company “unicorn” status. [Read More]
Citrix has started rolling out patches for the recently disclosed Citrix Application Delivery Controller (ADC) and Citrix Gateway vulnerability. [Read More]
Microsoft is working on a patch for CVE-2020-0674, a critical Internet Explorer vulnerability that has been exploited in targeted attacks. [Read More]
Microsoft introduced Microsoft Application Inspector, a source code analyzer designed to identify interesting characteristics of the code. [Read More]
Hackers are exploiting the recently disclosed critical vulnerability in Citrix Application Delivery Controller (ADC) and installing their own backdoor while cleaning up other malware infections and blocking others from exploiting the vulnerability. [Read More]
Industry professionals comment on the Windows crypto vulnerability patched this week by Microsoft and the NSA’s decision to disclose the flaw. [Read More]

FEATURES, INSIGHTS // Vulnerabilities

rss icon

Joshua Goldfarb's picture
Performing gap analysis well and remediating findings appropriately can help reduce both the number of weak points within your enterprise and your susceptibility to attack at each of them.
John Maddison's picture
Organizations must adopt a holistic approach to securing their distributed networked environment that enables them to see and manage their entire distributed network, including all attack vectors, through a single pane of glass.
Gunter Ollmann's picture
With years of bug bounty programs now behind us, it is interesting to see how the information security sector transformed – or didn’t.
Marie Hattar's picture
There are good and bad ways to make vulnerabilities known. A premature “full disclosure” of a previously unknown issue can unleash the forces of evil, and the “black hats” often move faster than vendors or enterprise IT teams.
Gunter Ollmann's picture
Any bug hunter, security analyst, software vendor, or device manufacturer should not rely on CVSS as the pointy end of the stick for prioritizing remediation.
Gunter Ollmann's picture
In a world of over-hyped bugs, stunt hacking, and branded vulnerability disclosures, my advice to CISOs is to make security lemonade by finding practical next steps to take.
Josh Lefkowitz's picture
Regardless of which framework you use, it’s crucial to operationalize it in the context of your organization’s unique environment and risk factors.
Marc Solomon's picture
Recalculating and reevaluating priorities based on a continuous flow of new data, learnings and your risk profile, helps to ensure you’re staying focused on what matters in a highly dynamic environment.
Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.
Torsten George's picture
Application Programming Interfaces (APIs) provide hackers with multiple venues to access an organization’s data and can even be used to cause massive business disruptions.