Security Experts:

More Security Headlines

Kaspersky Lab has shared details of Skygofree, a sophisticated, multi-stage mobile spyware that gives attackers the ability to take over an infected Android device. [Read More]
BlackBerry launches Jarvis, a tool that helps companies in the automotive and other sectors scan their code for vulnerabilities and achieve compliance [Read More]
Facebook patches vulnerabilities that could have been exploited to hack accounts via Oculus app [Read More]
ICS-CERT conducted over 170 assessments in critical infrastructure organizations in 2017 – main weakness remains improper boundary protection, but shared user accounts are increasingly problematic [Read More]
Jordan Evan Bloom made his first court appearance to answer charges of running a website that collected personal and password data from some three billion accounts, and sold them for profit. [Read More]
Four malicious Chrome extensions managed to infect over half a million users worldwide, including employees of major organizations, ICEBRG reports. [Read More]
A new variant of the disk-wiper malware known as KillDisk has been spotted in attacks aimed at financial organizations in Latin America [Read More]
A malicious tool that managed to fly under the radar since April 2017 is showing great focus on obfuscation, in an attempt to evade detection, Palo Alto Networks warns. [Read More]
Cybercriminals are already taking advantage of the massive attention the recently detailed Meltdown and Spectre CPU flaws have received in order to spread malware. [Read More]
The World Economic Forum's Cyber Resilience Playbook for Public-Private Collaboration helps leaders develop a baseline understanding of the key issues and policy positions relating to cybersecurity and resilience. [Read More]

SecurityWeek Experts

rss icon

Alastair Paterson's picture
Remember that cybercriminals will shift targets and evolve their tactics, techniques and procedures (TTPs) throughout the year.
Steven Grossman's picture
President Ronald Reagan taught us to “trust but verify,” meaning trust is great, but blind trust is dangerous.
Josh Lefkowitz's picture
These tips and best practices will provide insight into some of the key components and processes of a successful usiness Risk Intelligence (BRI) program.
Rafal Los's picture
Without transparency you cannot have trust. And without trust, your business will suffer long-term negative consequences.
Barak Perelman's picture
2018 will present new and increasing industrial cyber security challenges for facilities operators, but new developments will help minimize those threats.
Lance Cottrell's picture
The internet drives much of the world’s intelligence gathering, but its rapid evolution and lack of flexible policy-making is affecting how analysts do their jobs.
Marc Solomon's picture
There’s no reason that 2018 should be another year where attackers continue to successfully exploit the known.
Alan Cohen's picture
While the overwhelming array of choices has given technologists a lot to evaluate, they have not gone far enough to lower the actual security risk facing organizations.
Jim Ivers's picture
With a software composition analysis (SCA) tool in place, security teams can quickly scan an information repository and know where vulnerable software is being used.
Joshua Goldfarb's picture
Many organizations seem to focus almost entirely on technological solutions to tactical problems, rather than on strategically addressing how they can best and most efficiently protect data.