Top use cases currently being automated: Malware Brute Force/Failed Login Phishing Suspicious Web Access Malicious Network Traffic The top use cases planned for automation in the next 12 months include: Vulnerability Management Data Loss/Exposure Rogue Server/Service and Incident Case Management The top use cases planned for automation in the next 24 months include: Privileged Access […]

    Siri, Alexa, and Google Assistant are vulnerable to attacks that use lasers to inject inaudible­ — and sometimes invisible­ — commands into the devices and surreptitiously cause them to unlock doors, visit websites, and locate, unlock, and start vehicles, researchers report in a research paper published on Monday. Dubbed Light Commands, the attack works against […]

    Microsoft Windows patches included a fix for a critical vulnerability in the system’s crypto library. A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates. An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from […]