This post arrives later than usual, but as they say, "Better late than never." Researchers and the media have highlighted various unique, interesting, or destructive vulnerabilities in the last few weeks. We decided to pick three of these vulnerabilities and talk about them. One was patched with Microsoft's Patch Tuesday in March; another affects the privacy of almost everyone, … [Read more...]
CVE-2020-0674: Internet Explorer Vulnerability
Given the recent end of support for Windows 7 and Winders Server 2008 platforms, the timing could not be better for this vulnerability to make the news. Worse still, this Internet Explorer (IE) vulnerability applies to modern Windows platforms as well, and an official patch is not expected until February’s Patch Tuesday (the second Tuesday of every month), which means the … [Read more...]
Artificial Intelligence: An Essential Layer of Security for Businesses of All Sizes
Cyber attacks occur in the blink of an eye. A single point of infection can spread like wildfire from endpoint to endpoint; location to location; and business to business. Traditional approaches to protection rely heavily on manual processes and preestablished policies to block attacks that fail to keep up with the ever-evolving nature of threats. Parsing through huge … [Read more...]
Why Government Vulnerability Disclosure Processes Need Private Sector Involvement
Most people are either staunchly for or against the practice of governments finding and concealing zero-day exploits for use in cyber warfare or information gathering campaigns. What’s often overlooked, though, are perspectives that this issue can be a lot more gray than it is black and white. Did you know that the US government actually has a process in place to assess both … [Read more...]
Bleedingbit Bleeds Bluetooth
A new Bluetooth vulnerability called Bleedingbit came out yesterday, affecting Bluetooth APs if they use a Texas Instruments chip. With many IoT devices using Bluetooth including TVs, cellphones, locks, and modern cars there are a lot of potential devices that could be exploited. Before we dive in, if you are a WatchGuard customer, you're probably wondering if you are … [Read more...]