Security Experts:

More Security Headlines

Google resolved multiple critical-severity flaws in Android, including a bug leading to remote code execution via Bluetooth. [Read More]
Iran has arrested the deputy chief editor of Fars news agency, state media said, more than a week after the agency was reportedly hit by a cyberattack. [Read More]
Brazilian privileged access management (PAM) solutions provider Senhasegura raises $13 million in Series A funding. [Read More]
Rackspace confirms being hit by ransomware as it tries to determine if the cybercriminals managed to steal any sensitive information. [Read More]
A threat actor tracked as ‘Scattered Spider’ is targeting telecom and BPO companies to gain access to mobile carrier networks and perform SIM swapping. [Read More]
The new Sophos Firewall version 19.5 patches several vulnerabilities, including ones that can lead to arbitrary code execution. [Read More]
You're invited to join us for SecurityWeek's 2022 Security Operations Summit, an immersive online event that will offer insights and strategies to maximize the efficiency of enterprise security operations centers (SOCs). [Read More]
A misconfiguration that Netgear hot-patched last week in Nighthawk RAX30 routers could allow remote attackers to access services otherwise restricted to the local network. [Read More]
The Canadian branch of Amnesty International said Monday it was the target of a cyberattack sponsored by China. [Read More]
Serious vulnerabilities in widely used AMI BMC can expose many data centers and cloud services to attacks, including remote control, malware delivery and damage. [Read More]

SecurityWeek Experts

rss icon

Jeff Orloff's picture
The MITRE D3FEND framework is only as effective as the planning that goes into making sure it is properly aligned with the top threats facing the organization.
Derek Manky's picture
While the number of detections has been lower so far than other types of cyberattacks, the very nature of wipers and how they’re used makes them very dangerous.
Joshua Goldfarb's picture
I believe that as security and fraud professionals, we can learn an important career lesson from fictional company Entertainment 720.
Gordon Lawson's picture
Basic cyber hygiene may seem rudimentary, but as highlighted in CISA’s four key challenges above, it is something organizations of all sizes struggle with.
Torsten George's picture
When implemented properly, cyber resilience can be considered a preventive measure to counteract human error, malicious actions, and decayed, insecure software.
Galina Antova's picture
Understanding the vulnerability landscape of the XIoT to properly assess and mitigate risk is critically important to protect livelihoods and lives.
Marc Solomon's picture
When we start to consider the human element of the security automation equation, and its impact on the automation capabilities we select and how we measure progress, we can accelerate automation initiatives and the benefits we derive.
Joshua Goldfarb's picture
If security can learn to communicate in a way that executives and boar members can understand, internalize, and act upon, it serves to benefit tremendously.
Derek Manky's picture
Organizations may better align their defenses to adapt and react proactively to rapidly changing attack approaches when they have a better grasp of the objectives and strategies employed by their adversaries.
Jeff Orloff's picture
By focusing on attack tactics and techniques that pose clear and present danger to the business, a company can achieve the greatest return on its training initiatives.