Security Experts:

More Security Headlines

Attorneys general in more than 30 US states have urged the FTC to take into consideration the consumer harms associated with online surveillance and data security practices. [Read More]
Google has announced the release of YARA rules and a VirusTotal Collection to help detect Cobalt Strike and disrupt its malicious use. [Read More]
Security researcher publishes proof-of-concept (PoC) code targeting a macOS sandbox escape vulnerability. [Read More]
Security researchers are increasingly looking at Mastodon now that its popularity has soared, and they have started finding vulnerabilities and other issues. [Read More]
Atlassian has patched a security misconfiguration vulnerability in Crowd and a command injection vulnerability in Bitbucket. [Read More]
Microsoft has observed a threat actor tracked as DEV-0569 updating its delivery methods and distributing the Royal ransomware. [Read More]
A Ukrainian hacker sought by US authorities for a decade was arrested last month in Switzerland, according to reports. [Read More]
A critical vulnerability affecting Omron products has been exploited by a sophisticated piece of malware designed to target industrial control systems (ICS). [Read More]
CISA, NSA, and ODNI have released recommendations on how customers can help secure the software supply chain. [Read More]
The Hive ransomware gang has victimized more than 1,300 businesses, receiving over $100 million in ransom payments. [Read More]

SecurityWeek Experts

rss icon

Marc Solomon's picture
Within the context of security operations, anticipation teams use internal and external threat and event data across their security infrastructure for context and analytics and to become more proactive.
Marie Hattar's picture
Cybersecurity within the automotive industry has a long way to go to catch up to traditional enterprise cybersecurity standards and best practices.
Gordon Lawson's picture
Why are zero day exploits so effective, and so highly prized by bad actors? The reason has to do with the way cyber security defenses work.
John Maddison's picture
By integrating with native security services on major cloud platforms, a CNP solution can effectively correlate security findings to pinpoint risks and recommend effective mitigation.
Torsten George's picture
Unfortunately, there is no such thing as 100 percent protection. Therefore, we cannot solely focus on “Left of Boom” processes, but also have to talk about the “Right of Boom”.
Marc Solomon's picture
Cyberattacks and data breaches continue to rise year-over-year and another so-called silver bullet technology isn’t going to stop that trend.
Joshua Goldfarb's picture
Looking long is an important skill for security and fraud teams to develop. Strong leadership, a focus on achieving impactful long-term goals, and the discipline to achieve those goals are all important parts of the game.
William Lin's picture
AppSec is key to protecting production workloads from modern threats, but there are still too many silos and too much friction in existing implementations.
Derek Manky's picture
Linux systems are a popular delivery mechanism for malware. While they’re not the most popular – that distinction goes to HTML and Javascript – don’t think you can ignore them.
Galina Antova's picture
Over the last few years, the majority of large enterprises have come a long way in defining their operational technology (OT) governance strategies and making meaningful advances in risk reduction.