Security Experts:

More Security Headlines

A new, massive Mirai-linked botnet is recruiting improperly secured IoT devices such as IP wireless cameras [Read More]
Canada’s CSE spy agency releases the source code of a malware detection and analysis tool named Assemblyline [Read More]
Hackers breach Eltima website and use it to deliver macOS RAT Proton via a trojanized version of Elmedia Player [Read More]
Russia-linked cyber espionage group APT28 uses recently patched Flash Player zero-day to attack government organizations and aerospace companies [Read More]
Google is offering a bonus of $1,000 to researchers who find serious vulnerabilities in select Android apps present on Google Play [Read More]
Tech giants including Google, Facebook and Twitter will come under pressure in Italy this week to go further and faster in helping G7 powers tackle the ever-greater threat of extremists online. [Read More]
Recently observed distribution campaigns featuring the Ursnif banking Trojan were using new malicious macro tactics for payload delivery [Read More]
BoundHook hooking method is invisible to Windows 10’s PatchGuard. The issue is not considered a vulnerability by Microsoft [Read More]
Newly discovered Android malware can add compromised devices to a botnet that could potentially launch distributed denial-of-service (DDoS) attacks [Read More]
New Magniber (Magnitude+Cerber) ransowmare delivered to users in South Korea via Magnitude exploit kit [Read More]

SecurityWeek Experts

rss icon

Adam Meyer's picture
Threat intelligence playbooks that support strategic and operational levels help teams be more effective, more certain in their actions and allow security programs to be agile/maintained as situations change.
Alastair Paterson's picture
The Equifax breach has had a damaging impact on the company and has put its customers at risk. But it has also served as a wake-up call for organizations around the globe.
Jennifer Blatnik's picture
By taking what you know about security in the physical world and logically applying it to the virtual world, you can effectively protect your personal information.
Rafal Los's picture
With the many strategy development workshops in which I’ve successfully engaged, it’s hard to believe how many companies struggle with stakeholders as a starting point.
Justin Fier's picture
When third-parties are integrated onto the network, threats are bound to slip through the cracks, and the Equifax hack demonstrated how easy it is for a subtle threat to develop into a debilitating data breach.
Travis Greene's picture
If awareness isn’t working to change the behavior of employees and consumers, is there anything that can be done?
Galina Antova's picture
Following these prescriptive steps can help do something about the state of security in your own ICS network environment.
Marie Hattar's picture
Moving applications and content out to the edge of the network in cellular base stations is making some CSOs at large enterprises nervous.
Ashley Arbuckle's picture
If you’re among the majority taking an architectural approach to consolidate security vendors then remember, your best defense is a good offense.
Marc Solomon's picture
How do you determine the amount and mix of data that’s “just right” for your organization? To answer this question it helps to understand what’s driving the need for data in the first place.