Security Experts:

More Security Headlines

A coordinated effort by Facebook, Google and other online platforms to curb the spread of disinformation and thwart efforts to manipulate voters. [Read More]
Microsoft has rolled out an update for Windows Defender after Citrix customers noticed that some services stopped working after being detected as malware. [Read More]
The North Korea-linked threat group known as Lazarus has successfully compromised dozens of organizations in Israel and other countries by targeting their employees with appealing job offers. [Read More]
A previously misfiring smartphone app to help track transmission of the coronavirus will be trialled again in parts of England following two months of troubleshooting. [Read More]
The United States on Thursday published information on Drovorub, a previously undisclosed piece of malware that Russia-linked cyber-spies are using in attacks targeting Linux systems. [Read More]
Google is preparing to run an experiment in Chrome 86 as part of its fight against URL spoofing. [Read More]
The Chinese threat actor tracked by Kaspersky as CactusPete is not sophisticated, but its attacks are still relatively successful. [Read More]
Group-IB security researchers have identified a corporate espionage group, named RedCurl, that has launched 26 targeted attacks since 2018. [Read More]
An XSS vulnerability affecting the TinyMCE rich text editor can be exploited, depending on implementation, for privilege escalation, information disclosure or account takeover. [Read More]
FireEye this week announced that its Bugcrowd-powered bug bounty program has become public. [Read More]

SecurityWeek Experts

rss icon

Joshua Goldfarb's picture
In security, having a plan is important. That being said, there are times when a given plan may no longer be appropriate or effective.
Rafal Los's picture
More security tools can increase your cost, increase overall complexity, and eventually decrease your organization's ability to be effective.
Marc Solomon's picture
Most organizations have a complex security infrastructure that consists of multiple products from multiple vendors to create layers of defense.
Preston Hogue's picture
From a cybersecurity perspective, perhaps the greatest risk for digital education comes from the wide variation across districts in terms of resources.
Torsten George's picture
The tactics, techniques, and procedures (TTPs) used in the Twitter attack were not much different than in the majority of other data breaches and serve as valuable lessons for designing a modern cyber defense strategy.
Laurence Pitt's picture
Cybersecurity innovation is not quite at the stage where it needs resuscitation, still, the last few months have demonstrated the need for change.
Alastair Paterson's picture
Opportunities for accidental exposure of sensitive information are often compounded by multiple stakeholders using collaborative tools without the proper policies, oversight and security training.
AJ Nash's picture
Intelligence is one of a few vital security concepts that industries are increasing their investments in as they recognize the documented value of proactive security.
Marc Solomon's picture
Phil Jones who, who has overseen Operations within Airbus Cybersecurity since 2016, discusses some of the key takeaways from the current crisis.
Joshua Goldfarb's picture
Some security start-ups bring much needed creative thinking and new ideas to a challenging field. Others don’t bring much of anything to the table, and in some cases, can actually harm an organization’s security posture.