Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

The latest browser release includes patches for a total of 47 vulnerabilities, including 32 reported by external researchers. [Read More]
A researcher revealed that some exploits for the Spectre vulnerability were recently uploaded to VirusTotal. But just how serious of a threat do these exploits pose? [Read More]
The company seeks to improve security of servers and connected devices with Secured-core Server and Edge Secured-core. [Read More]
Microsoft has raised the alarm after discovering Chinese cyber-espionage operators chaining multiple zero-day exploits to siphon e-mail data from corporate Microsoft Exchange servers. [Read More]
An attacker able to successfully exploit the bug could execute code remotely on a vulnerable device. [Read More]
The new Unc0ver jailbreak, which works on a vast majority of iPhones, leverages a vulnerability that Apple said had been exploited before it released a patch in January. [Read More]
A Ryuk ransomware variant observed in early 2021 is capable of lateral movement within the infected networks. [Read More]
Threat intelligence vendor Recorded Future is reporting a wave of targeted attacks against power plants, electricity distribution centers and seaports in India. [Read More]
Asian food distributor JFC International says its IT systems were briefly disrupted by a ransomware attack. [Read More]
State and local governments will be required to spend a portion of nearly $1.9 billion in annual federal public safety grants on the fight against domestic extremism and improved cybersecurity. [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Josh Lefkowitz's picture
Regardless of which framework you use, it’s crucial to operationalize it in the context of your organization’s unique environment and risk factors.
Devon Kerr's picture
Devon Kerr explains what happened when a municipality inadvertently deployed a brand-new endpoint protection technology across a small part of their production network.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Ashley Arbuckle's picture
By learning from the past there are many steps we can take to strength our approach to security as attackers continue to turn to email to help accomplish their mission.
Siggi Stefnisson's picture
“Evasive phishing" is not a term much heard, but we all will—and need to—start talking a lot more about it than we have in the past.
Alastair Paterson's picture
BEC is becoming increasingly profitable for threat actors as organizations are making it easy for adversaries to gain access to the valuable information that sits within these inboxes.
Siggi Stefnisson's picture
We should be thinking about how users work, what they do and how it affects the security posture of the business, but does security really start with them?
Torsten George's picture
By implementing these measures organizations can limit their exposure to remote access-based cyber threats, while supporting agile business models such as remote work and outsourced IT.
Marc Solomon's picture
Recalculating and reevaluating priorities based on a continuous flow of new data, learnings and your risk profile, helps to ensure you’re staying focused on what matters in a highly dynamic environment.
Josh Lefkowitz's picture
Proper evaluation of business risk requires insight into the likelihood that a vulnerability will be exploited, and if exploited, how that vulnerability could impact the company on a macro level.