Security Experts:

More Security Headlines

The patches released by Linux distributions for the GRUB2 vulnerability dubbed BootHole (CVE-2020-10713) are causing many systems to become unbootable. [Read More]
Email and data security provider Mimecast on Thursday announced the acquisition of messaging security company MessageControl. [Read More]
Cybercriminals could be stealing data from EMV payment cards and using it to create magnetic stripe cards which they can use for card-present transactions. [Read More]
Twitter on Thursday revealed that several employees were targeted with phone spear-phishing in a social engineering attack leading to the recent security incident. [Read More]
Roughly one month after senators introduced a “balanced” bill that would require tech companies to provide law enforcement with access to encrypted user data, a companion bill was introduced in the House of Representatives this week. [Read More]
Red Hat has told customers not to install the package updates released in response to the BootHole vulnerability after users reported that their systems hung after applying the updates. [Read More]
Information security training and certification provider Offensive Security this week announced the acquisition of VulnHub, an open-source catalog of security training resources. [Read More]
Cisco has patched critical and high-severity vulnerabilities in its Data Center Network Manager (DCNM) product. [Read More]
The European Union imposed its first ever sanctions against alleged cyber attackers, targeting Russian and Chinese individuals and a specialist unit of Moscow's GRU military intelligence agency. [Read More]
A vulnerability that Zoom addressed in its web client could have allowed hackers to join private meetings by brute-forcing the passcode. [Read More]

SecurityWeek Experts

rss icon

AJ Nash's picture
Intelligence is one of a few vital security concepts that industries are increasing their investments in as they recognize the documented value of proactive security.
Marc Solomon's picture
Phil Jones who, who has overseen Operations within Airbus Cybersecurity since 2016, discusses some of the key takeaways from the current crisis.
Joshua Goldfarb's picture
Some security start-ups bring much needed creative thinking and new ideas to a challenging field. Others don’t bring much of anything to the table, and in some cases, can actually harm an organization’s security posture.
Galina Antova's picture
Three recommendations that can help foster acceptance for Digital transformation initiatives so that more companies can move quickly and drive business value.
Gunter Ollmann's picture
As SecOps teams increasingly take on proactive risk reduction, their vocabulary expands from security threats to include posture lapses, and posture fatigue will grow.
Torsten George's picture
Ransomware is just one of many tactics, techniques, and procedures (TTPs) that threat actors are using to attack organizations by compromising remote user devices.
Idan Aharoni's picture
The threat intelligence space is filled with great vendors who can provide organizations with a lot of value in helping them protect their brand, employees and customers.
Laurence Pitt's picture
To minimize the effect of an attack, an automated response is vital, which can reduce the amount of time between infection and resolution.
Galina Antova's picture
With the right tools in place, IT and OT teams can work together, leveraging visibility and continuity across the attack surface to govern OT networks with the same processes and reporting metrics.
John Maddison's picture
By combining verifiable trust, intent-based segmentation, and integrated security, organizations can establish a trustworthy, security-driven networking strategy.