Security Experts:

More Security Headlines

Microsoft has file a lawsuit to seize control over domains used to launch COVID-19-themed cyberattacks against the company’s customers in 62 countries. [Read More]
EDP Renewables North America has admitted that a recent cyberattack aimed at its parent company, which involved ransomware, also resulted in hackers accessing its own systems. [Read More]
The developers of the Purple Fox exploit kit (EK) have added two new exploits to their arsenal, both linked to the state-sponsored group known as DarkHotel. [Read More]
Microsoft has unveiled Project Freta, a free service that allows users to find rootkits and other sophisticated malware in OS volatile memory snapshots. [Read More]
China's ambassador to Britain on Monday warned that London faced a risk to its international reputation if it blocked Huawei from the nation's 5G network. [Read More]
A Nigerian national who has more than 2.5 million followers on Instagram was extradited from the United Arab Emirates and appeared in court in the US to face cybercrime-related charges. [Read More]
There are more than 3,000 BIG-IP installations vulnerable to attacks exploiting CVE-2020-5902 and hackers have been using the flaw to deliver DDoS malware. [Read More]
China urged France Monday to guarantee a "fair and just" environment for its companies after Paris decided to restrict licenses for telecom operators using 5G technology from Huawei. [Read More]
Facebook, WhatsApp and Telegram will deny law enforcement requests for user data in Hong Kong as they assess the impact of a new national security law. [Read More]
G Data security researchers have identified a new ransomware family that attempts to spread using infected USB drives. [Read More]

SecurityWeek Experts

rss icon

Marc Solomon's picture
With capabilities to quickly curate and integrate new threat data sources across your operations, you’re prepared for whatever the future brings.
Galina Antova's picture
When your core business operations, digital transformation initiatives and workers’ ability to do their jobs are at risk, effective OT security must become just as ubiquitous
John Maddison's picture
By combining ML and AI with a team of advanced cybersecurity professionals to deploy true AI-driven security operations, organizations can stay a step ahead of cybercriminals.
Laurence Pitt's picture
Every business is likely to be subject to cyberattacks at some point, and the option is to either take on the cost of putting measures in place before it happens or paying to clean up after.
Torsten George's picture
Today’s economic climate exacerbates risks of insider threats, as pending furloughs or pay cuts may tempt employees to exfiltrate data to secure a new job, make up for income losses, etc.
Joshua Goldfarb's picture
Most security organizations realize that, regardless of how much progress they’ve made towards improving maturity and efficiency, there is still more work to be done.
Idan Aharoni's picture
Many organizations are steadfast in their belief that dark web monitoring is a critical part of their security operations and the security industry is happy to fuel that belief.
Marc Solomon's picture
With an extensible platform and flexible data model, you can take full advantage of the volume and variety of data to gain insights, and the technologies in your ecosystem to accelerate detection and response and mitigate risk.
Alastair Paterson's picture
Researchers have undertaken a deep dive into the shadowy, cyber world of those whose work involves abusing others online through trickery, extortion, fraud, and theft resulting from COVID-19.
Galina Antova's picture
Eliminate complexity, align IT and OT teams, and simplify governance are my top three recommendations for how to bridge the IT-OT security gap.