Security Experts:

long dotted


The recent attacks exploiting the BlueKeep vulnerability to deliver cryptocurrency miners caused some systems to crash due to the Meltdown patch being installed. [Read More]
By estimating the global cybersecurity workforce, (ISC)2 asserts that it needs to grow by 145% in order to meet demand for skilled cybersecurity talent. [Read More]
Sepio Systems, which helps defend against the threat of rogue hardware, has raised $6.5 million in Series A funding. [Read More]
A new exploit kit named Capesand is being employed in live attacks despite still being in an unfinished state. [Read More]
A Long Island firm sold tens of millions of dollars in Chinese-made surveillance and other sensitive security equipment to customers, including the U.S. military to use on aircraft carriers, by falsely claiming the goods were manufactured in America. [Read More]
Saudi Arabia's King Salman hosted the Central Intelligence Agency's director, after three people were charged in the US with spying on Twitter users critical of the royal family. [Read More]
Ecommerce fraud prevention solutions provider Riskified has raised $165 million in a Series E funding round at a valuation of over $1 billion. [Read More]
Two former Twitter employees and a third man were charged in San Francisco Federal Court with spying on Twitter users critical of the Saudi royal family, the US Justice Department announced. [Read More]
Trend Micro has disclosed an insider threat incident that involved an employee selling information on roughly 100,000 customers to tech support scammers. [Read More]
The cyber threat actor known as DarkUniverse has been creating new malware samples just before delivering them to victims, Kaspersky Lab reports. [Read More]


rss icon

Siggi Stefnisson's picture
If I have one wish for ‘Cybersecurity Awareness Month,’ it’s that we all need to be aware of the need for innovative responses on the part of the security industry, to counter a threat industry which is innovating both technical and business models at a rapid pace.
Devon Kerr's picture
If phishing attacks slip past the first line of defense, security teams need to be able to identify suspicious activity and stop it before hackers can learn enough about their enterprise to execute a full attack.
Lance Cottrell's picture
Studying the DNC Hacker case shows just how difficult it is to maintain a false identity in the face of a highly resourced and motivated opponent.
Siggi Stefnisson's picture
The truth is that quite a lot of malware is developed by an organization—an actual office of people that show up and spend their working day writing malware for a paycheck.
Lance Cottrell's picture
Actively investigating and infiltrating criminal groups online is not “hacking back,” but it may provoke that as a response.
Alastair Paterson's picture
Malicious actors have been experimenting with a blockchain domain name system (DNS) as a way of hiding their malicious activity and bullet-proofing their offerings.
Lance Cottrell's picture
Even while using Tor hidden services, there are still many ways you can be exposed and have your activities compromised if you don’t take the right precautions.
Erin O’Malley's picture
When ransomware strikes, there aren’t many options for response and recovery. Essentially, you can choose your own adventure and hope for the best.
Laurence Pitt's picture
While awareness is key and technology is a great assistant, there is one simple practice we can all adopt: think before you click or share.
Siggi Stefnisson's picture
History shows that, in security, the next big thing isn’t always an entirely new thing. We have precedents—macro malware existed for decades before it really became a “thing.”