Security Experts:

More Security Headlines

Cybercriminals and nation state groups were quick to adopt the most effective exploits last year, a new AlienVault report reveals. [Read More]
A new malware family is targeting web servers worldwide in an attempt to ensnare them into a crypto-mining botnet, security researchers have discovered. [Read More]
Anomali, a security technology firm that offers a SaaS-based threat intelligence platform, announced that it has raised $40 million in series D funding. [Read More]
PureSec emerges from stealth with security product for serverless architectures and a guide describing the top 10 risks for serverless applications [Read More]
US authorities said Tuesday they had arrested a former CIA agent, Hong Kong resident Jerry Chun Shing Lee, after discovering he had an unauthorized notebook that had the identities of undercover US spies. [Read More]
Oracle released its Critical Patch Update for January 2018 to deliver 237 security fixes across its product portfolio, with half of the addressed vulnerabilities could be remotely exploited without authentication. [Read More]
ISC patches remotely exploitable BIND vulnerability that is not exploited in attacks, but has caused some DNS servers to crash [Read More]
A newly discovered variant of the Mirai Internet of Things (IoT) botnet is targeting devices with ARC (Argonaut RISC Core) embedded processors, researchers warn. [Read More]
Google researcher finds critical remote code execution vulnerability in Transmission BitTorrent app. An official fix has yet to be released [Read More]
Recorded Future has published details of a North Korean hacking campaign against South Korean interests, with particular emphasis on cryptocurrency exchanges, which does not yet appear to be active. [Read More]

SecurityWeek Experts

rss icon

Marc Solomon's picture
You need to increase the level of personalization to maximize the impact of threat data on your security operations and more effectively and efficiently protect your organization. There are several sources you can turn to.
Siggi Stefnisson's picture
I think it’s largely understood that the rise of a virtual, anonymized and easy-to-use payment system was a key factor in making ransomware the phenomenon it is today.
Erin O’Malley's picture
I promise to be more diligent about my personal cybersecurity, starting with five easy tasks that can help me – or anyone – improve online safety.
Joshua Goldfarb's picture
There are far too many cybersecurity entrepreneurs who simply chase after the hot topic of the day and not working to solve the problems of tomorrow.
Torsten George's picture
By supplementing traditional perimeter defense mechanisms with data integrity, identity management, and risk-based prioritization principals, organizations can significantly reduce their exposure
Travis Greene's picture
Maintaining consistent security controls across the entire hybrid IT environment is growing increasingly complex as more cloud services are adopted.
Ashley Arbuckle's picture
Closing the cybersecurity knowledge gap can provoke real, long-term change, and create a new perspective that not only protects customers and revenue, but also lifts-up your organization as a leader in its industry.
Lance Cottrell's picture
Laws to support swift and automatic updates for all devices, and consequence to organizations that fail to ensure their IoT devices are secure, would be a big step forward for IoT security.
Scott Simkin's picture
While it's not possible to put a physical firewall in the cloud, security professionals must apply the same rigor to secure the cloud as they would the network or the endpoint.
Erin O’Malley's picture
Detecting compromises requires monitoring a series of activities over time. Unfortunately, most security tools only have visibility into a certain set of activities and cannot see and comprehend the entire kill chain.