Security Experts:

More Security Headlines

Twitoor Android malware is using an innovative method of receiving commands: it connects to a Twitter account instead of a command and control (C&C) server, ESET researchers say. [Read More]
Attackers can chain together a couple of vulnerabilities to completely compromise VMware vRA appliances [Read More]
Dragos, a startup focused on protecting industrial control systems (ICS) from cyber threats, has raised $1.2 million from startup studio DataTribe. [Read More]
A critical vulnerability that can be exploited to bypass authentication affects servers, routers and gateways from Moxa [Read More]
A Linux Trojan (PNScan) that emerged more than a year ago is once again actively targeting routers in an attempt to install backdoors on them. [Read More]
A poorly conducted survey failed to provide enough information to come to any conclusion about the prevalence and effect of ransomware in UK universities. [Read More]
Wildfire, a recently observed piece of ransomware targeting mainly users in Belgium and the Netherlands, has generated roughly $80,000 in illicit revenue for its operators. [Read More]
Two browser hijackers were recently observed using a file-in-the-middle attack between browser shortcuts and the actual browser to redirect users to the sites of their choice. [Read More]
Cyberattacks targeting the World Anti-Doping Agency (WADA) have been linked by experts to the Russian threat actor known as Fancy Bear, APT28 and Pawn Storm [Read More]
A gang of foreign criminals stole millions of baht by hacking a Thai bank's ATM network in a theft believed linked to a similar one in Taiwan, police said. [Read More]

SecurityWeek Experts

rss icon

Jim Ivers's picture
Organizations should fear security concerns when considering moving applications to the cloud. But they need to recognize that moving web applications to the cloud does not make them secure.
Eddie Garcia's picture
A common misconception about native HDFS encryption is the belief that the data is encrypted when written to disk on the data nodes like most disk encryption solutions.
Barak Perelman's picture
The single biggest roadblock to ICS security today is the lack the visibility and control into activity that is occurring at the control layer, namely access and changes made to industrial control devices.
Adam Meyer's picture
As a defender, your mission is to reduce the impact of cyber threats to your organization. A good day means that the organization was not impacted by a cyber event.
Jennifer Blatnik's picture
While using containers to secure your organization is a relatively novel approach, it can lead to cost savings and massive scalability.
Joshua Goldfarb's picture
Writing and documenting aren’t the most exciting activities. But they have tremendous potential, both in improving security operations and incident response, as well as in opening up a constructive dialogue.
Alastair Paterson's picture
As recent events have shown, you shouldn’t let your guard down because a threat actor or operation appears to have been shut down.
Ashley Arbuckle's picture
How can security professionals harness cybersecurity to help their organizations take advantage of new opportunities in order to thrive in this digital era?
Erin O’Malley's picture
Hackers are humans, too, and most humans tend to veer toward the path of least resistance. So why wouldn’t they choose an easy—and lucrative—target like a hospital?
Ken McAlpine's picture
Once you have an understanding of where your security risks are, you can make better choices about what types and what sources of threat intelligence are most applicable.