Security Experts:

More Security Headlines

Recently disclosed remote code execution vulnerability related to Java implementations of AMF3 affects VMware vCenter Server via BlazeDS [Read More]
Company confirms cybercriminals used malware to steal payment card data from nearly 40 Shoney’s restaurants [Read More]
Microsoft assures customers that the latest Shadow Brokers exploits have already been patched, including several with March updates [Read More]
The author of a new piece of ransomware is selling their creation on underground forums as source code, Forcepoint security researchers have discovered. [Read More]
Files released by the mysterious hacker Shadow Brokers suggested Friday the US National Security Agency had penetrated the SWIFT banking network and monitored a number of Middle East banks. [Read More]
Cerber, one of the most active malware families over the past year, has increased its share of the ransomware market to 87% in the first quarter of 2017. [Read More]
Facebook disrupted an international fake account operation that was firing off inauthentic "likes" and bogus comments to win friends it would then pound with spam. [Read More]
Houston, TX-based PAS has taken a $40 Million investment that will be used to fuel its Industrial control system (ICS) cybersecurity business. [Read More]
Researchers disclose details of an unpatched Magento vulnerability that can be exploited by hackers to hijack online stores [Read More]
Vulnerabilities in Bosch’s Drivelog Connect dongle and its mobile app allow hackers to send malicious CAN messages to a car and stop its engine [Read More]

SecurityWeek Experts

rss icon

Josh Lefkowitz's picture
Executive protection and physical security teams must leverage cyber threat intelligence to gain visibility into all relevant cyber and physical threats and ensure open collaboration and information sharing with all business functions.
Scott Simkin's picture
When implemented as part of a natively-engineered security platform, these malware identification and prevention practices can reduce the operational burden put on security teams.
Adam Meyer's picture
As with anything new, you need to prepare and plan for IoT devices being in your environment to maximize the value they provide, while minimizing the inherent risk of these network-enabled devices.
Erin O’Malley's picture
In cybersecurity, basic hygiene is a must. You could implement every eye-catching security tool on the market, but without good, clean hygiene and the ability to deliver tools the right data at the right time, they’ll never shine their brightest.
Alastair Paterson's picture
A recent look at insider trading on the dark web shows how underground operators use OPSEC to protect their businesses.
Jennifer Blatnik's picture
If CISOs took a page from physicians and worked together to share missteps and move forward, they could gain crucial security learnings and prevent the spread of attacks.
Joshua Goldfarb's picture
Although attackers still use malicious code quite often, they have been relying less and less on it. So how do attackers manage to be so successful without using any malware at all?
Marc Solomon's picture
Companies can make their entire security infrastructure more effective by using this threat intelligence as the glue to integrate layers of point products within a defense-in-depth strategy.
Dan Cornell's picture
Gaining an understanding of the tools that development teams use provides security teams with valuable insight into how developers work, how they make decisions, and the incentives that drive them.
Ashley Arbuckle's picture
To develop a strong security posture while capturing digital value, transportation providers need to ask themselves some important questions.