Security Experts:

More Security Headlines

Fortinet has announced patches for multiple vulnerabilities across products, including a high-severity authentication bypass impacting FortiOS and FortiProxy. [Read More]
A ransomware attack on MSP Mercury IT has disrupted businesses, government departments, and public authorities in New Zealand. [Read More]
Four Nigerians arrested in the UK and Sweden have been charged in the US over their role in a scheme that involved hacking and filing false tax returns. [Read More]
Russia-linked espionage group Callisto has been observed focusing on entities providing Ukraine war support. [Read More]
Meta is expected to face another large fine after Europe's data watchdog imposed binding decisions concerning the treatment of personal data by the owner of Facebook, Instagram and WhatsApp. [Read More]
On the first day of Pwn2Own Toronto 2022, participants earned $400,000 for hacking printers, routers, phones and NAS devices. [Read More]
Google resolved multiple critical-severity flaws in Android, including a bug leading to remote code execution via Bluetooth. [Read More]
Iran has arrested the deputy chief editor of Fars news agency, state media said, more than a week after the agency was reportedly hit by a cyberattack. [Read More]
Brazilian privileged access management (PAM) solutions provider Senhasegura raises $13 million in Series A funding. [Read More]
Rackspace confirms being hit by ransomware as it tries to determine if the cybercriminals managed to steal any sensitive information. [Read More]

SecurityWeek Experts

rss icon

Jeff Orloff's picture
By focusing on attack tactics and techniques that pose clear and present danger to the business, a company can achieve the greatest return on its training initiatives.
Gordon Lawson's picture
The new SEC requirements are putting on paper what many companies—public and private—should have been investing in already.
Landon Winkelvoss's picture
How organizations can use managed services to optimize their threat intelligence program during an economic downturn.
Torsten George's picture
Here are five best practices for defeating against most attacks, hopefully making the need for future Cybersecurity Awareness Months obsolete.
Marc Solomon's picture
Within the context of security operations, anticipation teams use internal and external threat and event data across their security infrastructure for context and analytics and to become more proactive.
Marie Hattar's picture
Cybersecurity within the automotive industry has a long way to go to catch up to traditional enterprise cybersecurity standards and best practices.
Gordon Lawson's picture
Why are zero day exploits so effective, and so highly prized by bad actors? The reason has to do with the way cyber security defenses work.
John Maddison's picture
By integrating with native security services on major cloud platforms, a CNP solution can effectively correlate security findings to pinpoint risks and recommend effective mitigation.
Torsten George's picture
Unfortunately, there is no such thing as 100 percent protection. Therefore, we cannot solely focus on “Left of Boom” processes, but also have to talk about the “Right of Boom”.
Marc Solomon's picture
Cyberattacks and data breaches continue to rise year-over-year and another so-called silver bullet technology isn’t going to stop that trend.