Security Experts:

More Security Headlines

The Scranos rootkit-enabled spyware operation has expanded reach outside of China to hit targets worldwide. [Read More]
One of Idaho’s largest insurance companies, Blue Cross of Idaho, said someone hacked its website and obtained access to the personal information of about 5,600 customers, including their names, claim payment information and codes indicating medical procedures they may have undergone. [Read More]
A new variant of the HawkEye keylogger/information stealer is being leveraged in ongoing malware distribution campaigns. [Read More]
Norwegian aluminum giant Norsk Hydro has made significant progress in restoring operations following the recent LockerGoga attack, but the incident has forced the company to delay its Q1 2019 financial report. [Read More]
FireEye releases an open source tool designed to automate the analysis of Adobe Flash files to identify malware and prevent infections. [Read More]
Intel adds Hardware Shield security feature to its new 8th Gen Intel Core vPro mobile processors to protect devices against firmware attacks. [Read More]
Hackers breached Microsoft email services (Outlook.com, Hotmail, MSN) and accessed user accounts after compromising a support agent’s credentials. [Read More]
Ecuador said on Monday it has suffered 40 million cyber attacks on the webpages of public institutions since stripping Wikileaks founder Julian Assange of political asylum. [Read More]
Garfield County, Utah, was recently affected by ransomware that apparently encrypted enough systems to require County officials to switch to paper administration. [Read More]
A recently patched Windows zero-day vulnerability tracked as CVE-2019-0859 had been exploited to deliver a PowerShell backdoor. [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Joshua Goldfarb's picture
If we want our security teams to master the art of stumbling onto great findings, we need to create the right surroundings to foster that.
Barak Perelman's picture
Just as internet security was a relative unknown concern 20 years ago, public awareness of threats to the electric grid, water supplies, etc. is mounting
Grady Summers's picture
Unlike buzzwords from prior years at RSA Conference, this year’s buzzwords are all throwbacks of sorts. They represent a return to fundamentals of information security.
Stan Engelbrecht's picture
Here are a few observations from my time at RSAC 2019 about SOAR and the cybersecurity world at large.
Marc Solomon's picture
You need a way to ensure your threat hunting efforts are focused on high-risk threats and that the team is operating efficiently since time is the enemy.
Ashley Arbuckle's picture
By learning from the past there are many steps we can take to strength our approach to security as attackers continue to turn to email to help accomplish their mission.
Laurence Pitt's picture
By working together, IT and OT teams can ensure better security across the whole enterprise environment and that can only be good for business.
Justin Fier's picture
The origin story of Mimikatz — a post-exploitation module that has enabled criminals to steal millions of passwords around the world — reads like an over-the-top spy thriller.
Gunter Ollmann's picture
DLP has always been tricky to deploy and enforce, and most CISOs can freely regale stories of DLP promises and their subsequent failures.
Josh Lefkowitz's picture
The best way for intelligence practitioners to identify what types of context their intelligence consumers truly need is simply to ask them.