Security Experts:

More Security Headlines

Malta's largest bank was the target of a cyber attack Wednesday, with hackers attempting to withdraw 13 million euros ($14.7 million). [Read More]
0patch releases fix for the recently disclosed remote code execution vulnerability affecting OpenOffice. LibreOffice also impacted, but an official patch has been released for it. [Read More]
A Windows application that can run on Macs has been caught downloading and installing malware. [Read More]
Beijing calls the latest US warning against using Huawei equipment "groundless", as the Chinese telecom giant faces espionage fears in a growing number of countries. [Read More]
Senators have recently introduced and reintroduced bills whose goal is to help the U.S. government address the shortage of cybersecurity expertise. [Read More]
SAP's February 2019 security updates address over a dozen vulnerabilities across its product portfolio, including a Hot News flaw in SAP HANA Extended Application Services. [Read More]
Researchers have detected a new, stealthy Astaroth trojan campaign that uses anti-malware product Avast to inject a malicious module into one of its processes. [Read More]
Apophis Squad hackers, one from the US and one from the UK who is already serving a prison sentence there, have been charged by US authorities. [Read More]
UK-based Identity Data Intelligence specialist GBG has agreed to acquire the Atlanta-based identity verification and fraud prevention services provider IDology for $300 million in cash. [Read More]
Researchers demonstrate that Intel’s SGX technology can be abused to hide an advanced piece of malware that can allow attackers to steal data and conduct activities on the victim’s behalf. [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Devon Kerr's picture
To take advantage of the MITRE ATT&CK matrix, you must accept and prioritize the importance of visibility within your security operation.
Laurence Pitt's picture
Speech recognition systems make mistakes that could give cybercriminals access to a user’s home network. By activating a squatted skill, an unexpecting user could allow a malicious actor to extract information about their account, home network and even passwords before running the requested command.
John Maddison's picture
Outsourcing security has been gaining popularity as a way to ensure defense-in-depth across distributed network environments—in spite of the security skills shortage and growing cyber threat challenge.
Alastair Paterson's picture
Cybercriminals rely on tried and trusted methods for phishing; as long as there is even a four percent chance that phishing techniques will be successful, they will continue to use them.
Joshua Goldfarb's picture
In some instances, it is precisely because we are so familiar and comfortable with something that makes us incapable of seeing that there is a better way.
Jalal Bouhdada's picture
The Secure Development Lifecycle (SDL) process is still notable by its absence in many new deployments of Industrial Internet of Things (IIoT) technologies.
Marc Solomon's picture
The ability to aggregate, score and prioritize data and alerts within the context of your environment can allow you to take the right actions faster to mitigate IoT risk.
Ashley Arbuckle's picture
Network segmentation can be challenging to implement, scale, and manage. But, you shouldn’t let this reality prevent you from moving forward.
Dean Weber's picture
IoT security is a tough challenge — involving everything from hard to implement standards; hard to reach industrial components; and choices on how to integrate security around both older “brownfield” and newer IoT systems and equipment.
Josh Lefkowitz's picture
A business risk intelligence (BRI) program needs to understand and account for the different categories of risk faced by all business functions across an enterprise.