Security Experts:

More Security Headlines

Researchers at Websense have come across a new piece of malware that leverages legitimate websites and services in an effort to disguise its malicious activities.
The Russia-based dating website Topface has completed its investigation into the theft of 20 million customer email addresses reported last week.
Git repository hosting service GitHub has doubled the maximum amount of money it’s prepared to pay out to researchers who responsibly disclose vulnerabilities.
Symantec has discovered a link between a backdoor Trojan and the Skeleton Key malware used to bypass authentication on Active Directory systems.
Reddit on Thursday issued its first transparency report, revealing numbers of requests for user data and bids to have content removed from the online messaging board.
LightCyber, an Israel-based security breach detection and response solutions provider, today announced an improved version of its LightCyber Magna platform.
A new report from Akamai Technologies credit the growth of the DDoS-for-hire market for an explosion of multi-vector distributed denial of service attacks.
Several solutions from Schneider Electric are plagued by a serious vulnerability that could be exploited for remote code execution (RCE).
Researchers at SentinelOne have analyzed a new variant of the notorious banking Trojan Zeus and managed to access the control panel used by cybercriminals to monitor and control their operations.
Hackers encrypt information stored in website databases and hold it for ransom in a type of attack dubbed by researchers "RansomWeb"

SecurityWeek Experts

rss icon

James McFarlin's picture
If there were any lingering doubts that cybersecurity is a geopolitical issue with global implications, such opinions were cast on the rocks by discussions this past week at the 2015 World Economic Forum in Davos, Switzerland.
Jason Polancich's picture
After seeing an adaptation of Thomas Pynchon’s Inherent Vice, the movie started making more sense to me than the threat intelligence market. Then it hit me.
Marc Solomon's picture
“Slow and Low” isn’t just a popular song by the Beastie Boys. It’s also the tempo that adversaries are now choosing to launch attacks and evade detection.
Fahmida Y. Rashid's picture
Piper Jaffray's fourth annual CIO survey found that 75 percent of CIOs were expecting to increase their security spending in 2015. But are these security investments spent and utilized wisely?
Travis Greene's picture
When it comes to protecting against insider threat, there can be an over-reliance on policy and automated enforcement. Access Governance is a powerful tool to reduce the insider threat, but it needs to mature to the point where it is more responsive and more automated before relying on it completely.
Joshua Goldfarb's picture
The past few decades in the information security field have been dominated by passive failure. Clearly, not every new idea has merit, but those ideas that come about scientifically and methodically have tremendous potential to improve the state of security.
Rebecca Lawson's picture
As we enter the New Year, it’s time to reflect on these latest occurrences and consider what they may lead to in the year that lies ahead.
Nate Kube's picture
There are interesting lessons learned from IT IPS experiences that OT can benefit from. The first is to understand how attackers have bypassed traditional IPS IT solutions.
Scott Gainey's picture
Several financial analyst firms concluded extensive studies, surveying over a thousand CIOs and CSOs cumulatively, to gain a better understanding of how these breaches are impacting spending behaviors.
James McFarlin's picture
The overall industry tone of caution around active defenses may be calibrated to defuse the notion rather than taking the argument, buying time for other alternatives to surface.