Security Experts:

More Security Headlines

Dow Jones has exposed the details of millions of customers via a misconfigured AWS S3 bucket [Read More]
Tens of thousands of Memcached servers are exposed to the Internet and vulnerable to attacks leveraging critical remote code execution flaws found last year [Read More]
An unknown hacker managed to hack the CoinDash official website during the company's ICO (Initial Coin Offering) and diverted over $7 million worth of Ethereum by replacing the official wallet address with their own. [Read More]
Two Iranians were indicted Monday in the United States with hacking a defense contractor and stealing sensitive software used to design bullets and warheads, according to the Justice Department. [Read More]
Fuzzing reveals several DoS and remote code execution vulnerabilities in FreeRADIUS [Read More]
A Lithuanian man who allegedly swindled $100 million (87 million euros) from tech giants Google and Facebook must be extradited to the United States, a court ruled on July 17. [Read More]
Cisco patches critical WebEx remote code execution vulnerabilities found by Google and Divergent Security researchers [Read More]
A new variant of the CryptoMix ransomware was recently observed, appending the .EXTE extension to the targeted files, security researchers warn. [Read More]
Google this week will start inviting 2-Step Verification (2-SV) SMS users to try Google Prompt, its year-old method of approving sign-in requests on smartphones. [Read More]
IBM has announced its latest version of its mainframe, the IBM Z14, which it calls "the most significant re-positioning of mainframe technology in more than a decade." [Read More]

SecurityWeek Experts

rss icon

Kevin Bowers's picture
Dynamic analysis can help determine the runtime effects of a piece of malware, but with tools for sandbox detection and evasion becoming increasingly common, its value is limited.
Travis Greene's picture
As employees spend more time outside the office in the summer months, risk increases. Most of us bring our work, and the devices that we use to access it, with us wherever we go, including on our vacations.
Ashley Arbuckle's picture
An ecosystem exists for security professionals that enables and supports the sharing of information so we can work together to thwart attacks. You just need to tap into it.
Alan Cohen's picture
Since VMware introduced the concept of micro-segmentation for data center security, the security and networking industry have been racing to introduce competing technologies to reduce the lateral spread of bad actors in the data center and cloud.
Alex Cox's picture
As organizations across industries work to shore up their cyber incident response procedures, both sophisticated cyber war games and simple rehearsals will be essential tools for their security operations
Marie Hattar's picture
When done successfully, continuous testing and training prevents bugs and performance issues from going out the door, while enabling developers to better spot problems in the future.
Michael Moniz's picture
Your elite cyber defense team needs to actively communicate, pass the bits of evidence around, develop the big picture strategy and be able to adjust to different adversaries.
Barak Perelman's picture
If WannaCry had targeted industrial controllers, it would have been much more difficult to protect them and the damage would have been much more widespread.
Lance Cottrell's picture
By surreptitiously monitoring and engaging with potential attackers and malware developers you can successfully gain information about emerging attack methods, patterns, and practices in the cyber underground.
Josh Lefkowitz's picture
Most threat intel teams haven’t been conditioned to maintain a comprehensive understanding of how geopolitical factors can influence, emergent strains of malware, insider threats, or supply chain security vulnerabilities.