Security Experts:

long dotted


The web server that the Zoom Client installs on Macs can be abused to execute code remotely, security researchers have discovered. [Read More]
The Forum of Incident Response and Security Teams (FIRST) announces CVSS v3.1, which aims to simplify and improve upon CVSS v3.0. [Read More]
Apple disabled the Walkie-Talkie app on the Apple Watch after learning of a serious vulnerability that can be exploited to eavesdrop via another user’s iPhone. [Read More]
Mozilla has made public its new "Grizzly" browser fuzzing framework designed to enable the fast deployment of fuzzers at scale. [Read More]
Apple has released an update to remove the Zoom web server from all Macs, following controversy that it puts users’ security at risk. [Read More]
Hardcoded credentials in Kiosk Software made by Uniguest allowed remote attackers to access data and install malware on systems via API. [Read More]
SAP has released 11 Security Notes as part of the Patch Day – July 2019, one of which was a Hot News Note addressing a Critical vulnerability in Diagnostics Agent. [Read More]
One of the Windows zero-days patched by Microsoft with its July 2019 updates, CVE-2019-1132, was used by the Buhtrap group to target a government organization in Eastern Europe. [Read More]
Intel patches a high-severity vulnerability in its Processor Diagnostic Tool that can be exploited by an attacker to escalate privileges, obtain information or launch DoS attacks. [Read More]
A high-severity vulnerability in Rockwell Automation’s PanelView graphics terminals can be exploited by a remote, unauthenticated attacker to gain root-level access to the device’s file system. [Read More]

FEATURES, INSIGHTS // Vulnerabilities

rss icon

Josh Lefkowitz's picture
Regardless of which framework you use, it’s crucial to operationalize it in the context of your organization’s unique environment and risk factors.
Marc Solomon's picture
Recalculating and reevaluating priorities based on a continuous flow of new data, learnings and your risk profile, helps to ensure you’re staying focused on what matters in a highly dynamic environment.
Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.
Torsten George's picture
Application Programming Interfaces (APIs) provide hackers with multiple venues to access an organization’s data and can even be used to cause massive business disruptions.
Torsten George's picture
Microservices and containers enable faster application delivery and improved IT efficiency. However, the adoption of these technologies has outpaced security.
Oliver Rochford's picture
We can’t rely on our own governments to practice responsible full disclosure. Full Disclosure is compromised. We can’t really blame them. Either everyone discloses, or no-one does.
Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.
Travis Greene's picture
As DevOps and agile development methodologies take greater root in the enterprise, the traditional tools and approaches for eliminating vulnerabilities in code will no longer be able to keep pace.
Dan Cornell's picture
When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the various testing approach options.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.