Security Experts:

More Security Headlines

Researchers have disclosed new firmware vulnerabilities that can be exploited by hackers to gain long-time access to any of the millions of affected devices. [Read More]
CISA and NSA have described the typical game plan of malicious actors targeting critical infrastructure control systems. [Read More]
Portugal’s national airline TAP Air Portugal says hackers obtained the personal data of some of its customers and have published the information on the dark web. [Read More]
Twitter has logged out some users from their accounts after learning of a security issue related to password resets. [Read More]
Malwarebytes has announced a $100 million funding round that will help it advance products and channel partnerships. [Read More]
Australian wireless carrier Optus discloses data breach impacting the personal information of both former and current customers. [Read More]
CISA and the FBI have provided information on the cyberattacks that Iranian APTs conducted against the Albanian government in July. [Read More]
Wiz shares information on an Oracle Cloud Infrastructure vulnerability allowing attackers to modify users’ storage volumes without authorization. [Read More]
Researchers have resurrected a 15-year-old Python vulnerability that is present in an estimated 350,000 open source projects and many closed-source applications. [Read More]
NATO sent a senior-level delegation to Albania to help the tiny Western Balkan country cope with the consequences of recent cyberattack that the government blamed on Iran. [Read More]

SecurityWeek Experts

rss icon

Torsten George's picture
Unfortunately, there is no such thing as 100 percent protection. Therefore, we cannot solely focus on “Left of Boom” processes, but also have to talk about the “Right of Boom”.
Marc Solomon's picture
Cyberattacks and data breaches continue to rise year-over-year and another so-called silver bullet technology isn’t going to stop that trend.
Joshua Goldfarb's picture
Looking long is an important skill for security and fraud teams to develop. Strong leadership, a focus on achieving impactful long-term goals, and the discipline to achieve those goals are all important parts of the game.
William Lin's picture
AppSec is key to protecting production workloads from modern threats, but there are still too many silos and too much friction in existing implementations.
Derek Manky's picture
Linux systems are a popular delivery mechanism for malware. While they’re not the most popular – that distinction goes to HTML and Javascript – don’t think you can ignore them.
Galina Antova's picture
Over the last few years, the majority of large enterprises have come a long way in defining their operational technology (OT) governance strategies and making meaningful advances in risk reduction.
Marc Solomon's picture
Even though things have changed—from SOAR to XDR to CSMA—they have also stayed the same. These new categories are not solutions but really architectures.
Landon Winkelvoss's picture
Organizations need to be able to go outside the firewall to gather as much threat actor information as possible to build robust internal defenses against fraud.
Jeff Orloff's picture
Nothing can ever prepare an organization for every ransomware scenario. However, if you train for multiple situations, your team will be able to make decisions more quickly, and react appropriately when an unforeseen incident occurs.
Laurence Pitt's picture
Between the excitement and the comfort of working from home, it can be easy to overlook the risks associated with summer travel, but it’s important to remain careful and vigilant.