Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Hackers are confident that they will outperform AI for the next 10 years when it comes to finding vulnerabilities, Bugcrowd study shows. [Read More]
Twitter has informed business users that their billing information may have been exposed through their web browser’s cache. [Read More]
Mitsubishi Electric and its subsidiary ICONICS have released patches for the vulnerabilities disclosed earlier this year at the Pwn2Own hacking competition targeting ICS. [Read More]
A stored XSS vulnerability in OSIsoft PI System, a product often present in critical infrastructure facilities, can be exploited for phishing, privilege escalation and other purposes. [Read More]
AMD is preparing patches for a vulnerability affecting the System Management Mode (SMM) of the UEFI shipped for some notebook and embedded processors. [Read More]
A high-severity vulnerability found in IBM’s Maximo asset management product makes it easier for hackers to move around in enterprise networks. [Read More]
Cisco announces that it has added new security features to Webex and also patched several high-severity vulnerabilities in the conferencing product. [Read More]
Drupal patches several vulnerabilities, including PHP code execution and cross-site request forgery (CSRF) flaws. [Read More]
An analysis of the “Official Trump 2020” application revealed that keys to various parts of the app were being exposed to attacks. [Read More]
Amnesty International warns that contact-tracing technology developed to contain the novel coronavirus threatens users' privacy, highlighting Bahraini, Kuwaiti and Norwegian apps as "among the most dangerous". [Read More]

FEATURES, INSIGHTS // Vulnerabilities

rss icon

Torsten George's picture
Application Programming Interfaces (APIs) provide hackers with multiple venues to access an organization’s data and can even be used to cause massive business disruptions.
Torsten George's picture
Microservices and containers enable faster application delivery and improved IT efficiency. However, the adoption of these technologies has outpaced security.
Oliver Rochford's picture
We can’t rely on our own governments to practice responsible full disclosure. Full Disclosure is compromised. We can’t really blame them. Either everyone discloses, or no-one does.
Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.
Travis Greene's picture
As DevOps and agile development methodologies take greater root in the enterprise, the traditional tools and approaches for eliminating vulnerabilities in code will no longer be able to keep pace.
Dan Cornell's picture
When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the various testing approach options.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.
Lance Cottrell's picture
Laws to support swift and automatic updates for all devices, and consequence to organizations that fail to ensure their IoT devices are secure, would be a big step forward for IoT security.
Jim Ivers's picture
With a software composition analysis (SCA) tool in place, security teams can quickly scan an information repository and know where vulnerable software is being used.
David Holmes's picture
The "Reaper" IoT botnet is holding itself up as a blinky light in front of our faces, reminding the InfoSec community that we really need to get ahead of IoT madness.