Security Experts:

More Security Headlines

The ColdFusion vulnerability could allow unprivileged users to execute arbitrary code with SYSTEM privileges. [Read More]
The Supernova malware discovered during an investigation into the SolarWinds supply chain attack may have been created and used by Chinese hackers. [Read More]
The NSA and FBI released detailed information about the Drovorub Linux malware, but major cybersecurity companies haven't found a single sample. [Read More]
Fixes for over 40 vulnerabilities were included in the Android security updates for February 2021. [Read More]
In late September 2020, hackers stole employee personal information, including financial account information, from Wind River. [Read More]
ESET details Kobalos, a sophisticated multiplatform malware that has been observed targeting several high-performance computers and other types of organizations. [Read More]
Hackers exploited a flaw in an Accellion file transfer service to access files at the Office of the Washington State Auditor (SAO). [Read More]
SonicWall has confirmed that its SMA 100 series remote access appliances are affected by an actively exploited vulnerability, and says a few thousand devices are impacted. [Read More]
Safari and macOS updates patch NAT Slipstreaming 2.0, which could allow attackers to compromise devices on the local network. [Read More]
Threat actors compromised a software company to deliver malware to five out of over 100,000 users. [Read More]

SecurityWeek Experts

rss icon

Yaniv Vardi's picture
The Swiss Army Knife approach helps ensure we’re prepared for many different situations and can act fast. It also makes sense for how we should approach industrial cybersecurity.
Marc Solomon's picture
The pandemic has resulted in security team members and teams working better together, as well as more closely with other departments and with industry sharing groups.
Joshua Goldfarb's picture
By implementing controls to prevent fraud and implementing fraud monitoring capabilities, state agencies can greatly reduce the amount of unemployment fraud that happens under their auspices.
Laurence Pitt's picture
In 2021 we will see challenges and changes, but the moves forward will be positive and empower both users and the business to succeed securely.
Torsten George's picture
Domain controllers, Active Directory, and servers are prime reconnaissance targets to hunt for additional privileged credentials and privileged access.
AJ Nash's picture
For companies trying to build new or mature existing intelligence programs, the Age of COVID has been an excellent time to capture 30-60 minutes with that hard-to-find manager
Yaniv Vardi's picture
The change we encountered in 2020 was unprecedented and had a dramatic impact on our operational technology (OT) environments – accelerating and sometimes recasting how we address the following four key areas.
Marc Solomon's picture
To push security operations forward, we must move towards a single, collaborative environment that can include threat hunters, incident handlers and threat intelligence and SOC analysts.
Joshua Goldfarb's picture
For any fraud detection solution to be practical, it must be easily integrated into security and fraud operations.
Laurence Pitt's picture
In the world of information security, it’s hard to flip between internet browser tabs without hearing a new term, and one of the biggest in 2020 was Secure Access Service Edge (SASE).