Security Experts:

More Security Headlines

Recent disruptions at the Pan-American Life Insurance Group (PALIG) were likely caused by a cyberattack conducted by a group known for using the REvil ransomware. [Read More]
The individuals were part of a network providing cash-out and money laundering services to cyber criminals. [Read More]
The European Banking Authority, a key EU financial regulator, says it has fallen victim to a hack of its Microsoft email system which has been blamed on the Chinese "Hafnium" hacking group. [Read More]
Several cybersecurity-related acquisitions and mergers were announced in the first week of March 2021. [Read More]
The trend of exploiting third-party service providers shows no signs of slowing because it gives criminals the highest return on their investment. [Read More]
The Williams team presented its new Formula One car — after hackers foiled plans for an “augmented reality” launch — revealing a livery inspired by its “all-conquering cars of the 1980s and 1990s.” [Read More]
Microsoft on Friday released alternative mitigation measures for organizations using Exchange Server who have not been able to immediately apply emergency out-of-band patches [Read More]
John McAfee faces charges he cashed in on a "pump-and-dump" scheme, promoting cryptocurrencies on Twitter to drive up their value. [Read More]
Security vendor Zimperium warns that improperly implemented cloud containers expose user information in thousands of mobile applications. [Read More]
A data breach at SITA, a company that specializes in air transport communications and IT, has impacted multiple airlines and hundreds of thousands of their customers. [Read More]

SecurityWeek Experts

rss icon

Derek Manky's picture
Each side of the public-private collaboration has resources and capabilities that shore up the other and increase effectiveness in combatting cybercrime.
Torsten George's picture
Cyber resilience can be considered a preventive measure to counteract human error, malicious actions, and decayed, insecure software.
Tim Bandos's picture
The ransomware threat could still become more pervasive over the next two to three years, not because ransomware is effective in and of itself but because of other players in the game continue to fan the flames.
John Maddison's picture
Security tools, regardless of where they have been deployed, need to be able leverage common security intelligence feeds and share alerts and threat data with other security tools.
Yaniv Vardi's picture
Supply chain cyber risk is complicated and spans the entire lifecycle of a product—across design, manufacturing, distribution, storage, and maintenance.
Laurence Pitt's picture
Over the coming weeks, we must be vigilant as there will be a glut of activity and misinformation from cybercriminals wanting to disrupt the COVID-19 vaccine rollout.
Marc Solomon's picture
The center of gravity of the Security Operations Center (SOC) used to be the SIEM, but this is shifting as the mission of the SOC shifts to become a detection and response organization.
Joshua Goldfarb's picture
Josh Goldfarb discusses what enterprises can do to mitigate risk and limit losses account takeover (ATO) fraud, account opening (AO) fraud, and payment fraud.
Idan Aharoni's picture
Proposed Distributed Account Information Certification (DAIC) enables organizations to quickly and securely validate the bank account information of companies before they send payments
Derek Manky's picture
If the history of cybersecurity has taught us anything, it’s that any time that we implement a new tool, a new capability, or a new functionality, security threats follow.