Security Experts:

More Security Headlines

IBM analyzes 13 crypters employed by the cybercrime group operating TrickBot, Conti, and several other malware families. [Read More]
The personal information of more than half a million Chicago Public Schools students and staff was compromised in a ransomware attack last December, but the vendor didn’t report it to the district until last month, officials said. [Read More]
Nikkei discloses ransomware attack against its Singapore headquarters, saying customer data was likely impacted. [Read More]
The attackers use sqlps.exe, a utility for running SQL-built cmdlets, to achieve fileless persistence on poorly secured SQL servers. [Read More]
The US Department of Justice has updated its policy regarding violations of CFAA to clearly state that ethical hacking should not be prosecuted. [Read More]
As Ukrainians flooded into Poland, Russian invaders, a hacking group aligned with the Kremlin sought to spread rumors that criminal gangs were waiting to harvest the organs of child refugees. [Read More]
A new software supply chain hack combines typosquatting and the impersonation of a known Rust developer to plant malware aimed directly at infecting GitLab Continuous Integration (CI) pipelines. [Read More]
Researchers have discovered a new approach being taken by phishers to increase victim engagement and confidence: the addition of an interactive chatbot. [Read More]
QuSecure's platform was designed to provide an ‘easy button’ for the infrastructure-wide rapid implementation of NIST recognized quantum resilient encryption. [Read More]
Cloud data security company Dig has emerged from stealth mode with $11 million in seed funding. [Read More]

SecurityWeek Experts

rss icon

Keith Ibarguen's picture
As email security is an ever-changing landscape, focusing on the most relevant issues in the threat landscape is where organizations need to start.
Marie Hattar's picture
As IoT adoption increases within healthcare, healthcare organizations and device manufacturers will need to prioritize the security of connected medical devices to keep patient data private and ensure the safety of the patient.
Marc Solomon's picture
Here are three challenges CISOs should prepare for as the ripple effects of the SEC amendments make their way through to board recruitment processes.
Joshua Goldfarb's picture
In addition to helping security teams recruit and retain the talent they need, employee wellness brings other benefits. Here are five ways in which wellness is good for security:
Galina Antova's picture
There are seven immediate steps you can take to put your organization on the path toward better situational awareness and risk reduction to protect critical infrastructure.
Gordon Lawson's picture
The surge of cyber attacks in 2021 was a wake-up call for consumers, who felt the firsthand effects that can result from a breach.
William Lin's picture
Most organizations want to adopt DevSecOps practices, but their current practices are closer to traditional waterfall methodologies than the agile practices described in this DevSecOps manifesto.
Derek Manky's picture
Linux is becoming a more popular target for attackers as it operates the back-end systems of many networks and container-based solutions for IoT devices and mission-critical applications.
Jeff Orloff's picture
With the labor market for cybersecurity pros being extremely tight, the old ways of recruiting are rife with weaknesses and biases, while the urgency to recruit people is intense.
Laurence Pitt's picture
It’s time to step back and look at the role of the IT industry in developing, deploying, maintaining, growing and eventually, sustainably retiring technology and solutions.