Security Experts:

More Security Headlines

Google researcher discovered that CloudFlare had been leaking sensitive customer data, including passwords and encryption keys [Read More]
Filecoder is a newly discovered ransomware targeting macOS that destroys encryption keys before sending them to its apparently inexperienced developer. [Read More]
A recently observed campaign using the Poison Ivy remote access tool (RAT) against individuals within the Mongolian government uses publicly available techniques that haven’t been observed in previous campaigns. [Read More]
By looking at how professional hackers work, security teams are in a better position to plug the gaps effectively rather than just by the latest technicolor product. [Read More]
Google and CWI announced the first SHA-1 collision, creating two PDFs with different content but identical hashes [Read More]
Fortinet released details on the top malware, ransomware, mobile malware, IPS events, botnets, and exploit kits targeting the healthcare industry in Q4 2016. [Read More]
A locally exploitable vulnerability found in the Linux kernel can be exploited for code execution or DoS attacks [Read More]
Researchers use drones and hard drive LEDs to steal data from air-gapped computers at speeds of up to 4,000 bps [Read More]
Netflix releases Stethoscope, an open source security tool that gives users recommendations for securing their devices [Read More]
A newly discovered Android ransomware variant that packs speech recognition capabilities demands that victims speak a code provided by the attackers to unlock their devices, Symantec researchers warn. [Read More]

SecurityWeek Experts

rss icon

Marc Solomon's picture
There are strategies you can use so that the risk score is more relevant and useful within your specific environment.
Ashley Arbuckle's picture
Generally referred to as the “attack chain,” the approach cybercriminals follow to launch and execute attacks is well-documented and includes reconnaissance, weaponization, delivery, and installation.
Torsten George's picture
Let’s consider whether the proposed principles and tools by the World Economic Forum (WEF) can improve cyber resilience, and which types of enterprises can benefit most from implementing them.
Travis Greene's picture
Shadow IT 2.0 is a symptom of a bigger problem – the inability to maintain digital competitive advantage due to the insufficient pace of code deployment.
Jack Danahy's picture
Protection against the effects of ransomware starts with a clear understanding of all of the means that attackers will use to implant that first malicious package.
Jim Ivers's picture
Enabling developers through the right mix of tools and education just makes too much sense and generates too much value for all concerned.
Joshua Goldfarb's picture
Let’s take a look at the essential functions required to bring a mature security operations and incident response capability to the masses via a unified security operations platform.
Scott Simkin's picture
Attackers have developed anti-VM analysis techniques to allow the malware to recognize when it is being run on a virtual machine and fail to execute, meaning the system or threat analytics cannot make a verdict determination or extract intelligence from the sample.
Josh Lefkowitz's picture
It’s critical to recognize that there will always be virtual ways in which terrorists and other criminals can create threats that no border process or physical security program can stop.
Adam Meyer's picture
Cyber threat intelligence needs to be tailored to its audience as it means different things to different people, whether it’s on-the-network defenders, Red Teams, threat analysts, risk officers, business executives and Board of Directors, legal, application owners, and so on.