Security Experts:

More Security Headlines

0patch has created free patches for actively exploited Windows remote code execution vulnerabilities for which Microsoft has yet to release official fixes. [Read More]
Proton Technologies, the developer of ProtonMail and ProtonVPN, this week disclosed the existence of an unpatched iOS flaw that causes some VPN traffic to remain unencrypted. [Read More]
A recently observed campaign is attempting to infect the iPhones of users in Hong Kong with an iOS backdoor that allows attackers to take control of devices. [Read More]
A hacker has stolen files related to some AMD GPUs and they plan on making them all public unless they get paid. [Read More]
Log management platform Humio this week announced that it closed a $20 million Series B funding round, bringing the total investment raised to date to $32 million. [Read More]
The official website of kitchen products maker Tupperware was hacked and the attackers planted malicious code designed to steal visitors’ payment card information. [Read More]
Apple this week announced that third-party cookies are now blocked by default in Safari on macOS, iOS and iPadOS. [Read More]
A vulnerability that OpenWrt addressed in its opkg fork could have been exploited for the remote execution of arbitrary code. [Read More]
Rockville, Maryland-based startup Sepio Systems, a rogue device mitigation firm, has raised a further $4 million that supplements the Series A round of $6.5 million announced in November 2019. [Read More]
A global survey of 1,000 IT security professionals has revealed that over 70% would rather protect corporate networks than industrial organizations. [Read More]

SecurityWeek Experts

rss icon

Galina Antova's picture
As the size of the remote workforce surges, network administrators of operational technology (OT) networks find themselves on the front lines of enablement.
Torsten George's picture
Static passwords lack the ability to verify whether the user accessing data is authentic or just someone who bought a compromised password.
Alastair Paterson's picture
The barriers to entering the field of cybercrime have been significantly lowered, and for modest amounts of money, would-be scammers can buy high-quality phishing tools online.
Marc Solomon's picture
It’s up to humans, guided by instinct, intelligence and experience, to determine the right data, so they can focus on what matters to the organization, make better decisions and take the right actions.
Laurence Pitt's picture
We’ve seen a shift away from ‘common themes’ across the RSA Conference to real development in plenty of new areas that truly advance cybersecurity.
Craig Harber's picture
Many organizations are not aware that their network sensors are improperly or inefficiently deployed because they do not have a full understanding of how to act on the network traffic being collected.
Galina Antova's picture
Adversaries can enter through IT networks and remain undetected within an OT environment for months or even years, looking for subtle ways to undermine operations and create havoc.
Gunter Ollmann's picture
The philosophy of integrating security practices within DevOps is obviously sensible, but by attaching a different label perhaps we are likely admitting that this “fusion” is more of an emulsification.
John Maddison's picture
A security platform is much more than just wrapping a collection of security tools together into a single bundle and then adding some sort of a shell script so independent management tools appear to be part of a congruent solution.
Joshua Goldfarb's picture
How many times have you met someone full of promises and big on talk, only to be disappointed by what results from your engagement with them.