Security Experts:

More Security Headlines

Four high severity denial-of-service (DoS) vulnerabilities have been patched in the BIND DNS software on January 11 [Read More]
Eight vulnerabilities and 62 bugs patched with the release of WordPress 4.7.1, including the recently disclosed PHPMailer flaw [Read More]
Italian siblings Giulio Occhionero and Francesca Maria Occhionero have been charged with conducting a long-running cyber espionage campaign against Italian politicians, businessmen and Masons using EyePyramid malware. [Read More]
Trend Micro's Zero Day Initiative (ZDI) paid out nearly $2 million in 2016 for vulnerabilities [Read More]
Spora is a new and feature-rich ransomware that allows users not only pay to recover their encrypted files, but also for immunity from future attacks. [Read More]
The smartphones of dozens of Israeli soldiers were hacked by Hamas militants pretending to be attractive young women online, an Israeli military official said. [Read More]
The group calling itself “Shadow Brokers” is offering Windows exploits and anti-virus bypass tools for sale in a new underground marketplace. [Read More]
Nearly 33,000 MongoDB databases have been hijacked as of today, the latest numbers associated with a series of attack campaigns that have been picking up pace over the past couple of weeks show. [Read More]
Developers of the Ansible automation platform release updates to patch a vulnerability that allows arbitrary command execution on the controller [Read More]
The RIG exploit kit (EK) managed to grab nearly 35% of the overall EK activity during the last month of 2016, retaining the leading spot in the landscape for the fourth month in a row, Symantec reports. [Read More]

SecurityWeek Experts

rss icon

Marie Hattar's picture
Given the security events over the past year, ,2017 will be the year in which many finally accept that network infrastructure and security will have to be rethought from the ground up.
Erin O’Malley's picture
Like a mist along the ground, the future will arrive and, already, predictions are being made. So whose will come true?
Jim Ivers's picture
If your target is a connected toy, there is a new angle to consider: how secure is that toy? Is the connectivity of the toy potentially exposing personal data about your child?
Travis Greene's picture
2017 is the year for information security teams to align to the work being done in DevOps – whether you call it DevSecOps or not.
Joshua Goldfarb's picture
It’s time to bring the capability to achieve a mature security posture through a robust security operations function to the masses.
Barak Perelman's picture
Most industrial Control Systems (ICS) lack basic asset discovery and management capabilities common in IT networks.
Scott Simkin's picture
Looking back at the big cybersecurity news stories of 2016, several trends stand out, which may provide a peek into what cybersecurity professionals should be preparing for in 2017.
Avi Chesla's picture
In today’s market, more does not mean better. We need security innovation that makes more of what the industry already has by turning what we have into what we need.
Adam Meyer's picture
At the end of the day, whatever your cyber threat intelligence plan and process is, it should drive faster and smarter decisions that minimize your risk exposure.
Alastair Paterson's picture
By being aware of the latest tactics, techniques and procedures (TTPs), organizations can understand how to mitigate damage and thwart cyber attacks during the holidays.