Security Experts:

More Security Headlines

The stolen credentials used in the recent Shamoon attacks may have been provided by a threat group dubbed "Greenbug" [Read More]
Facebook awarded a researcher $10,000 for a flaw that could have been exploited to delete any video or disable commenting [Read More]
A critical vulnerability in the Cisco WebEx browser extension allows attackers to remotely execute arbitrary code [Read More]
The source code of Android banking Trojan BankBot, along with instructions on how to use it, recently emerged on a hacker forum. [Read More]
San Francisco - Yahoo said Monday that the closing of a $4.8 billion deal to sell its core internet assets to US telecom titan Verizon has been delayed several months. [Read More]
A newly discovered Twitter botnet has been lying dormant for over three years, although it includes more than 350,000 bots, researchers at the University College London have discovered. [Read More]
Lavabit is recommencing operations on a new secure end-to-end communications platform, Lavabit owner Ladar Levison announced. [Read More]
A newly discovered variant of the HummingBad Android malware called "HummingWhale" has been downloaded millions of times after infecting 20 applications in Google Play. [Read More]
China plans to "clean up" internet service providers and crack down on devices such as virtual private networks (VPNs) used to evade strict censorship. [Read More]
In a new study, researchers show that de-identified web browsing histories can be linked to social media profiles using only publicly available data. [Read More]

SecurityWeek Experts

rss icon

Rafal Los's picture
Do you ever find yourself trying to protect your organization from exotic attack scenarios that are highly unlikely or that would have a minimal impact on you?
Scott Simkin's picture
Threat intelligence can play an important role in improving an organization’s overall cybersecurity posture, provided the right case is made and the right processes are put in place.
Adam Meyer's picture
Cyber threat intelligence is showing us is that most threats simply exploit a series of well-documented vulnerabilities and other weak points to move along the path of least resistance – and the most profit.
Alastair Paterson's picture
Although ransomware and DDoS attacks have captured the attention of the security industry of late, a surge in trojan variants targeting banks across geographies is catching many by surprise.
Barak Perelman's picture
One of the biggest concerns, if these industrial threat predictions come true, is the likelihood of widespread collateral damage.
Josh Lefkowitz's picture
Not adhering to responsible disclosure has the potential to amplify the threats posed by certain vulnerabilities and incidents.
Ashley Arbuckle's picture
The healthcare industry has a lot to gain by digital transformation. However it also has a lot to lose if it doesn’t start with security as a foundation.
Marc Solomon's picture
Analysts must work together and across the organization to provide the right intelligence in the right format and with the right frequency so that it can be used by multiple teams.
Lance Cottrell's picture
When properly integrated, detection, response, and prevention reinforce each other, each making the other more effective.
Travis Greene's picture
Whether US government officials improve their handling of classified information in the new administration or not, industry can certainty learn from the blunders and reduce risks.