Security Experts:

More Security Headlines

Malware developers have used the source code of the remote access tool (RAT) Njw0rm to create two new RATs, researchers at Trend Micro reported on Thursday.
Adobe Systems issued a security advisory late Thursday, stating that it expects to have a patch available for a critical vulnerability (CVE-2015-0311) in its Flash Player during the week of January 26.
Researchers at Kaspersky Lab disclosed information about two of the modules used by the notorious malware platform.
Barrett Brown, journalist also known as an informal spokesman for the hacker group Anonymous was sentenced to five years in prison.
An email scam which targets businesses with bogus invoices has netted more than $214 million from victims in 45 countries in just over one year, an FBI task force said Thursday.
The "Scarab" attack group has been linked to a number of targeted campaigns during the past three years, according to Symantec.
Adobe has released an out-of-band update to address a Flash Player vulnerability that has been exploited in the wild in attacks targeting older versions of the application.
A new variant of the CTB-Locker (Critroni) ransomware has been spotted in the wild by researchers at Trend Micro.
"Privacy as we knew it in the past is no longer feasible... How we conventionally think of privacy is dead," said Margo Seltzer, a professor in computer science at Harvard University.
Australia-based enterprise software provider Atlassian has released updates to address a serious vulnerability affecting several of the company’s solutions.

SecurityWeek Experts

rss icon

Rebecca Lawson's picture
As we enter the New Year, it’s time to reflect on these latest occurrences and consider what they may lead to in the year that lies ahead.
Nate Kube's picture
There are interesting lessons learned from IT IPS experiences that OT can benefit from. The first is to understand how attackers have bypassed traditional IPS IT solutions.
Scott Gainey's picture
Several financial analyst firms concluded extensive studies, surveying over a thousand CIOs and CSOs cumulatively, to gain a better understanding of how these breaches are impacting spending behaviors.
James McFarlin's picture
The overall industry tone of caution around active defenses may be calibrated to defuse the notion rather than taking the argument, buying time for other alternatives to surface.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.
Torsten George's picture
With cyber criminals increasingly targeting third-party vendors to gain backdoor access to data at large, well-protected global organizations, security professionals need to rethink their vendor risk management practices.
Danelle Au's picture
A data breach plan lays out the key steps and the key personnel to involve when a data breach happens, and needs to incorporate three elements.
Joshua Goldfarb's picture
At a high level, "big data" and "security analytics" are about the two very different, somewhat diametrically opposed, but equally important concepts of collection and analysis.
James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
Jason Polancich's picture
Most businesses today cannot say with any certainty how the cybersecurity tools or people they acquire and use align with their specific cyber problems.