Security Experts:

More Security Headlines

The Smominru botnet continues to spread at a fast pace, infecting around 4,700 new hosts daily during the month of August. [Read More]
Facebook chief executive Mark Zuckerberg was expected in Washington Thursday for private talks with policymakers as the leading social network faces a myriad of regulatory and legal issues. [Read More]
Cybersecurity firm Acronis becomes a unicorn company after raising $147 million in a funding round led by Goldman Sachs. [Read More]
GitHub acquires code analysis platform provider Semmle and becomes a CVE Numbering Authority. [Read More]
Philippines immigration agents, backed by troops, have arrested more than 300 Chinese for alleged cyber crimes, a week after a similar number were detained during a raid linked to investment fraud. [Read More]
Following a 4-month vacation, Emotet’s operators are back at it, borrowing a recently introduced spear-phishing technique to deliver their malware. [Read More]
The U.S. could launch a cyberattack on Iran in response to the recent drone attack on major oil facilities in Saudi Arabia. [Read More]
Facebook has shut down 200 accounts, groups and pages originating in Iraq and Ukraine that engaged in “inauthentic behavior.” [Read More]
Several critical remote code execution vulnerabilities have been found by Cisco Talos researchers in a PDF file processing product from Aspose. [Read More]
A previously undocumented hacking group called Tortoiseshell is using custom and off-the-shelf malware to target technology companies in Saudi Arabia in what appears to be supply chain attacks. [Read More]

ICS Cyber Security Conference

SecurityWeek Experts

rss icon

Alastair Paterson's picture
For companies based in the U.S. with customers and files in many different countries, reconciling conflicting practices and laws is likely to remain a serious headache for years to come.
Jim Gordon's picture
Intel's Jim Gordon presents critical top 10 tactical action items every SMB should take to protect itself.
Seema Haji's picture
Enormous bandwidth increases of 5G, the rapid expansion of edge computing and countless new IoT devices introduce risk despite their intended benefit.
Gunter Ollmann's picture
Any bug hunter, security analyst, software vendor, or device manufacturer should not rely on CVSS as the pointy end of the stick for prioritizing remediation.
John Maddison's picture
Intent-based segmentation, deception technology, and an integrated security fabric are essential tools in beating malware designed to avoid detection and analysis.
Marc Solomon's picture
Visualization holds the key for quickly understanding patterns and determining which threads to pull.
Torsten George's picture
While the urge to hack back after a data breach is very appealing, going back to the basics and applying proper cyber hygiene is a better alternative.
Joshua Goldfarb's picture
The Segway can offer us more security insight that we might initially realize. It is in this spirit that I offer five ways in which a Segway can instruct us as to how to improve our security programs and security postures.
Josh Lefkowitz's picture
No organization is fully immune to ransomware attacks, which is why having a comprehensive and well-tested incident response (IR) plan can make all the difference.
John Maddison's picture
Many cybersecurity companies claim to have introduced AI capabilities into their solutions, but most fall short of true AI because their underlying infrastructure is too small or their learning models are incomplete.