Security Experts:

More Security Headlines

NIST publishes second draft of the Framework for Improving Critical Infrastructure Cybersecurity [Read More]
Rockwell Automation patches high severity DoS vulnerability in FactoryTalk Alarms and Events (FTAE) product [Read More]
Four distinct groups of cybercriminals have emerged, serving as the new syndicates of cybercrime: traditional gangs, state-sponsored attackers, ideological hackers and hackers-for-hire. [Read More]
Organizations are getting better at detecting breaches, but attackers are also working on improving their tactics and techniques [Read More]
OpenSSL 1.0.2n patches two vulnerabilities discovered by a Google researcher using the OSS-Fuzz fuzzing service [Read More]
Thousands of WordPress sites have been infected with a piece of malware that can log user input, Sucuri warns. [Read More]
Iranian cyber espionage group tracked as OilRig and APT34 has been exploiting the recently patched Equation Editor vulnerability in Office to deliver malware [Read More]
Google is boosting the security of its popular web browser with the release of Chrome 63, which brings a host of enhancements aimed at enterprises and also addresses 37 vulnerabilities. [Read More]
Researchers devise new method, dubbed Process Doppelgänging, that can be leveraged by malware to evade security solutions [Read More]
Apple this week released security updates for macOS, watchOS, and tvOS, as well as updated versions of the Safari browser and the iTunes for Windows application. [Read More]

SecurityWeek Experts

rss icon

John Maddison's picture
Cybercriminals have begun to leverage automation and machine learning in their attack tactics, techniques, and procedures (TTP).
Markus Jakobsson's picture
While there are no signs today of criminals consolidating and reselling data from different breaches, it is an obvious concern as the value-add of the packaging would be substantial.
Justin Fier's picture
Organizations still using the legacy approaches from a year ago to five years ago are consistently outpaced and forced to play catch-up.
Travis Greene's picture
There are serious challenges to enabling true hybrid choice, covering mainframe, distributed, virtual, private and public cloud environments.
Galina Antova's picture
There is no more important mission in cybersecurity than securing the Industrial Control Systems networks that power our world and our lives.
Josh Lefkowitz's picture
Retailers need relevant, actionable intelligence that can help them gain a decision advantage over the threats and adversaries they face year-round -- not just during the holiday shopping season.
Torsten George's picture
We need to consider whether traditional approaches to vulnerability management are still viable and if just upgrading existing methods or tools is sufficient.
Adam Meyer's picture
It’s that time of year again when we look back at the past year and try to anticipate what we can expect in the coming year. Here is my cybersecurity forecast for 2018.
Alastair Paterson's picture
The holiday season is in full swing and once again we can expect to see a surge in cyber attacks targeting retailers and consumers.
Marc Solomon's picture
It is important to have a prioritized list of vulnerabilities based on the threats to your organization; this list will be different for each company based on their environment and risk profile.