Security Experts:

More Security Headlines

Free and open Certificate Authority (CA) Let’s Encrypt has issued nearly 15,000 certificates containing the term “PayPal” for phishing sites to date, a security researcher has discovered. [Read More]
FBI warns the healthcare industry that threat actors are targeting FTP servers that have anonymous authentication enabled [Read More]
Russia-linked threat group known as APT29 and Cozy Bear used domain fronting to disguise Tor traffic [Read More]
Czech President Milos Zeman has alleged that hackers based in the US state of Alabama put child pornography on one of his computers in 2016. [Read More]
Apple updated iTunes for Windows and Mac to address old vulnerabilities in the Expat and SQLite libraries [Read More]
A hacker gained access to the names, dates of birth and SSNs of job seekers in 10 U.S. states after breaching the systems of America’s JobLink (AJL) [Read More]
The Senate on voted to overturn FCC rules that would prevent ISPs from monetizing customers' information without their consent. [Read More]
A third-party app store application managed to slip into the official iOS App Store by masquerading as a legitimate financial helper application, according to Trend Micro researchers. [Read More]
Security researcher Christopher Truncer released a WMI-based agentless post-exploitation RAT that he developed in PowerShell. [Read More]
Windows zero-day patched this month by Microsoft exploited since last summer by Neutrino EK and AdGholas malvertising campaign [Read More]

SecurityWeek Experts

rss icon

Dan Cornell's picture
Gaining an understanding of the tools that development teams use provides security teams with valuable insight into how developers work, how they make decisions, and the incentives that drive them.
Ashley Arbuckle's picture
To develop a strong security posture while capturing digital value, transportation providers need to ask themselves some important questions.
Travis Greene's picture
If there are only five controls that a security organization can reasonably tackle this year, what should they be?
Torsten George's picture
Cyber security and cyber threats are most often confused with cyber risk, and often used interchangeably, but they are worlds apart.
Jack Danahy's picture
Identifying malicious software by recognizing that it just damaged the system or exfiltrated some amount of information is no longer defense, but detection.
Lance Cottrell's picture
In addition to basic credit monitoring, breached companies need to get ahead of the attacks and start providing security solutions that actually protect the victims before they are victimized again.
Avi Chesla's picture
Security analysts are collecting all events, but are struggling to filter out non-relevant signals in an attempt to isolate the important events from the rest of the noise.
Jim Ivers's picture
Enlightened toy manufacturers likely begin to embrace the basic concepts of IoT security and build connected toys that can be trusted by parents.
Ken McAlpine's picture
To apply an effective intent-based network security strategy to networks, security teams need to rethink how they plan, design, organize, and implement network architecture.
Jennifer Blatnik's picture
Every year, countless security vendors roam the show floor at RSA, promising that their latest revolutionary tool is going to solve the entire world’s security problems.