Security Experts:

More Security Headlines

A dropped, dubbed WiryJMPer and disguised as a virtual coin wallet, has been using heavy obfuscation in attacks delivering Netwire. [Read More]
Sophos has made its Sandboxie sandbox software free and plans on making it open source. [Read More]
IBM launches z15 mainframe with new capabilities designed to protect sensitive data across hybrid multi-cloud environments. [Read More]
President Benjamin Netanyahu on Thursday denied a media report that Israel spied on cell phones in the vicinity of the White House -- and President Donald Trump said he believed him. [Read More]
Fedir Hladyr, a 34-year-old Ukrainian accused of being the sysadmin of the FIN7 cybercrime group, pleaded guilty to hacking and wire fraud charges in Seattle. [Read More]
NSO Group, an Israeli spyware company that has been accused of helping authoritarian governments stifle dissent said it has adopted "a new human rights policy" to ensure its software is not misused. [Read More]
An analysis of Android flashlight apps available in Google Play reveals that they request an average of 25 permissions, with some requesting up to 77 permissions when installed. [Read More]
NETGEAR patches DoS vulnerabilities found by Cisco researchers in its N300 series wireless routers. [Read More]
The Russian hackers behind the 2016 Crashoverride/Industroyer attack that caused a power outage in Ukraine may have been hoping to cause more serious damage. [Read More]
The attack traffic recorded by F-Secure's global network of honeypots tripled from the last six months of 2018 to the first six months of 2019. [Read More]

ICS Cyber Security Conference

SecurityWeek Experts

rss icon

Seema Haji's picture
Enormous bandwidth increases of 5G, the rapid expansion of edge computing and countless new IoT devices introduce risk despite their intended benefit.
Gunter Ollmann's picture
Any bug hunter, security analyst, software vendor, or device manufacturer should not rely on CVSS as the pointy end of the stick for prioritizing remediation.
John Maddison's picture
Intent-based segmentation, deception technology, and an integrated security fabric are essential tools in beating malware designed to avoid detection and analysis.
Marc Solomon's picture
Visualization holds the key for quickly understanding patterns and determining which threads to pull.
Torsten George's picture
While the urge to hack back after a data breach is very appealing, going back to the basics and applying proper cyber hygiene is a better alternative.
Joshua Goldfarb's picture
The Segway can offer us more security insight that we might initially realize. It is in this spirit that I offer five ways in which a Segway can instruct us as to how to improve our security programs and security postures.
Josh Lefkowitz's picture
No organization is fully immune to ransomware attacks, which is why having a comprehensive and well-tested incident response (IR) plan can make all the difference.
John Maddison's picture
Many cybersecurity companies claim to have introduced AI capabilities into their solutions, but most fall short of true AI because their underlying infrastructure is too small or their learning models are incomplete.
Laurence Pitt's picture
Black Hat 2019 recently wrapped in Las Vegas, where somewhere between 15,000 and 20,000 experts descended to experience the latest developments in the world of cybersecurity.
Jim Ducharme's picture
If you want to succeed with FIDO, you have to be ready. Now is the time to assess your organization’s authentication needs, how they are evolving, and the dynamics of your user population.