Security Experts:

More Security Headlines

A database that allowed hackers to monitor systems infected through a maliciously modified CCleaner installer was erased on September 12, Avast has discovered. [Read More]
Access control company SecureAuth announced this week that will merge with Core Security, a firm focused on vulnerability discovery, identity governance, and threat management. [Read More]
Although ransomware uses the latest fileless techniques to beat defenses, the malware itself is often very simple. Security researchers do not expect this to continue. [Read More]
NVIDIA patches 8 DoS and privilege escalation vulnerabilities, including ones rated high severity, in GeForce, NVS, Quadro and Tesla GPU display drivers [Read More]
According to a new report, an average of 1.385 million unique new phishing sites are created every month, peaking at 2.3 million in May 2017. [Read More]
D-Link patches most of the DIR-850L router vulnerabilities disclosed recently by a researcher [Read More]
As the clock ticks down to elections Sunday, Germany's cyber defense nervously hopes it'll be third time lucky after Russia was accused of meddling in the US and French votes. [Read More]
Fuzzing conducted by Google Project Zero revealed more than 30 vulnerabilities in Chrome, Firefox, IE, Edge and Safari engines [Read More]
Judge dismisses three of the six counts in the FTC case against D-Link over its alleged failure to secure cameras and routers [Read More]
Attacks involving a rather unknown information stealing malware family dubbed FormBook have become increasingly frequent recently, fueled by the threat’s cheap price and the availability of a cracked builder. [Read More]

SecurityWeek Experts

rss icon

Siggi Stefnisson's picture
SSL encryption can create blind spots in many organizations, as malware in the HTTPS channel is essentially hidden from most web security tools.
Marc Solomon's picture
With the sheer volume of threat data continuing to climb at a staggering rate, security teams need to start with the threat – automating how we gather, score and prioritize threat intelligence.
Ashley Arbuckle's picture
MSSPs help alleviate the complexity of maintaining and managing a proliferation of security products and point solutions in order to get their full value.
Jennifer Blatnik's picture
If the rest of the community would give hackers more of a chance before writing them off as evildoers, there would potentially be more incentives for capable people to go into the white hat hacking business.
Alan Cohen's picture
There are different types of segmentation architectures: network centric, hypervisor centers, or distributed. Let’s take a look at each one and review the puts and takes of each approach.
Markus Jakobsson's picture
While 2FA is a big step above and beyond the use of traditional passwords, it is not infallible, and thinking so makes the risk of failure even greater.
Jennifer Blatnik's picture
Protecting this data is a necessity as more and more consumers are voluntarily offering up their rights to security or privacy in search for convenience.
Galina Antova's picture
From the boardroom to the security operations center, lip service can no longer be paid to ICS/critical infrastructure/OT cybersecurity.
Joshua Goldfarb's picture
Benchmarking is about understanding how people use a variety of different products and services, what challenges they use them to address, and how those products and services fit into the organization’s security strategy.
Josh Lefkowitz's picture
Regardless of the extent to which your organization shares information, there’s a lot we can all learn from the WireX botnet takedown.