Security Experts:

More Security Headlines

Cryptographers at Swiss university ETH Zurich have found at least five exploitable security flaws in the privacy-themed MEGA cloud storage service [Read More]
Mainly focused on intellectual property theft and cyberespionage, the state-sponsored hacking group was seen deploying a broad range of ransomware families. [Read More]
The ICS vendors whose products are affected by the OT:Icefall vulnerabilities have started releasing advisories. [Read More]
Johnson Controls has acquired Seattle-based Tempered Networks to help protect buildings from cyberattacks [Read More]
The personal information of more than one million patients was impacted in a March 2022 incident at patient care guidelines provider MCG Health. [Read More]
A US subsidiary of Japanese automotive hose maker Nichirin has been hit by ransomware, which forced the company to shut down some production controls. [Read More]
Firmware supply chain security company Binarly has announced a $3.6 million seed funding round led by Westwave Capital and Acrobator Ventures. [Read More]
State-backed Russian hackers have engaged in “strategic espionage” against governments, think tanks, businesses and aid groups in 42 countries supporting Kyiv, Microsoft says in a new report. [Read More]
A vulnerability in the SMA Technologies OpCon UNIX agent results in the same SSH key being added to all installations. [Read More]
The UK-based delivery service says deliveries might be delayed in some cases. [Read More]

SecurityWeek Experts

rss icon

Laurence Pitt's picture
It’s time to step back and look at the role of the IT industry in developing, deploying, maintaining, growing and eventually, sustainably retiring technology and solutions.
Landon Winkelvoss's picture
In the event of Russian cyberwarfare, reviewing the industries, styles, and objectives of their attacks can help organizations to prepare and implement more robust defenses.
Torsten George's picture
Organizations need to look beyond preventive measures when it comes to dealing with today’s ransomware threats and invest in ransomware response, which improves their ability to prepare and quickly recover endpoints from ransomware attacks.
Marc Solomon's picture
As threat actors continue to evolve their TTPs to take advantage of crises and outbreaks, the intelligence sources and information sharing mechanisms available to help will become even more important.
John Maddison's picture
Security systems can struggle to keep up when networks are in a constant state of flux—optimizing connections, redirecting workflows, adding new edges or endpoints, or scaling to meet shifting demands.
Joshua Goldfarb's picture
If you know for a fact that a person or group has poor intentions, it may make sense to begin documenting and reporting nefarious activity you observe from them.
Galina Antova's picture
The biggest advantage defenders have as the nature of the conflict and strategies evolve, is to know their networks better than the adversary.
Derek Manky's picture
Analyzing the attack goals of adversaries is important to be able to better align defenses against the speed of changing attack techniques.
Gordon Lawson's picture
Obfuscation technology creates a path to data and applications residing in commercial clouds that cannot be traced, and can be helpful for healthcare data security
Marc Solomon's picture
XDR architecture must be broad and deep so that organizations can get the most value out of their existing best-of-breed security solutions, including their free, open-source tools.