Security Experts:

More Security Headlines

A series of attacks carried out against banks in the Middle East in early May were using Macros and unique PowerShell scripts that are not commonly seen in crimeware campaigns, researchers at FireEye warn. [Read More]
A WPAD protocol vulnerability can be exploited by malicious actors for MitM attacks over the Internet [Read More]
Microsoft intends to dominate the corporate cloud, and everything it does is based on that intention. Google, however, seems to have lost its way. [Read More]
As ransomware authors continue to increase their presence on the threat landscape, the group behind the DMA Locker malware is getting ready for massive distribution, Malwarebytes researchers warn. [Read More]
Adobe has updated Connect for Windows to patch an untrusted search path vulnerability in the add-in installer [Read More]
A threat group believed to be operating from China has been targeting Indian embassies all over the world [Read More]
Microsoft has detailed some of the steps it is taking to combat terrorism online, which include removing terrorist content from its services and partnering with others to meet the challenges presented by terrorists’ use of the Internet. [Read More]
Recent attack on Swiss defense firm RUAG was carried out by the Russia-linked cyber espionage group Turla [Read More]
Google announced a new version of its Safe Browsing API and a focus on maximizing protection for both mobile and desktop users. [Read More]
A Critical Elevation of Privilege (EoP) vulnerability in the Qualcomm Secure Execution Environment (QSEE) affects around 60 percent of all Android devices around the world, despite being already fixed, researchers warn. [Read More]

SecurityWeek Experts

rss icon

Ryan Naraine's picture
Thomas Rid, Professor in the Department of War Studies at King’s College London, joins the podcast to discuss the lack of nuance in the crypto debate and the future of global cyber conflict.
Jim Ivers's picture
Software that protects the crown jewels of the organization and reduces risk translates to “valuable.”
Joshua Goldfarb's picture
If you’ve centralized all of your security resources, you will have a far more difficult time handling the incident than if you’ve strategically placed security resources around the globe.
David Holmes's picture
The leaked data from the Mossack Fonseca breach is supposed to illuminate dark corners of international tax evaders, but the "Panama Papers" story has many mysteries around it still.
Adam Meyer's picture
All three types of intelligence help drive decisions and ultimately outcomes, but at different levels within the business.
Alastair Paterson's picture
By understanding the different types of incidents and the different returns, you can make a strong case for greater cyber situational awareness in the short- and long-term.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?
Travis Greene's picture
Passwords really are that bad, and we now have another mandate to address this ongoing issue, or, the so-called elephant in the room: The growing push for multi-factor authentication.
Johnnie Konstantas's picture
While most of us aren’t asking for it, chances are high that we, too, have been—or will become—victims of a cyber attack.