Security Experts:

More Security Headlines

Windows 10 Creators Update can detect reflective Dynamic-Link Library (DLL) loading in a variety of high-risk processes, including browsers and productivity software, Microsoft says. [Read More]
Fileless attacks are on the rise and do not install detectable files, but leverage exploits designed to run malicious code or launch scripts directly from memory. [Read More]
Microsoft has patched a security vulnerability (CVE-2017-11882) that has impacted all versions of its Microsoft Office suite over the past 17 years. [Read More]
Amazon Echo and Google Home devices are vulnerable to attacks exploiting the recently disclosed BlueBorne vulnerabilities [Read More]
Russia has launched cyber attacks on the UK media, telecoms and energy sectors in the past year, Britain's cyber security chief said Wednesday amid reports of Russian interference in the Brexit referendum. [Read More]
A newly discovered multi-stage Android malware that managed to sneak into Google Play is using advanced anti-detection features, ESET security researchers reveal. [Read More]
Two major financial services and regulated industry compliance firms, Smarsh and Actiance, have combined to better serve industry's increasingly complex requirements around communications, archiving and discovery regulations. [Read More]
Oracle patches several vulnerabilities, including two rated critical, in the Jolt server component of the company’s Tuxedo product [Read More]
Forever 21 investigating payment card breach, but only few details were provided by the company [Read More]
The United States Department of Homeland Security (DHS) shared details of hacking tools they say are being used by a hacking group linked to the North Korean government known as “Hidden Cobra.” [Read More]

SecurityWeek Experts

rss icon

Rafal Los's picture
There is no “secure.” The minute you think you can reach that place, you’re already wrong. Worse, you’d doing yourself and your organization a disservice.
Steven Grossman's picture
Despite the significant momentary effect of major breaches on profits, stock prices and careers of company executives, most breaches to date have not had a long term financial effect on the businesses in question.
Siggi Stefnisson's picture
In the cat-and-mouse game between security providers and malware authors, cybercriminals keep innovating and experimenting – a dynamic seen in the recent resurgence of the Locky ransomware.
Josh Lefkowitz's picture
When key decision-makers broaden their mindsets and strategies pertaining to the value and function of intelligence, their organizations can become better positioned to mitigate the cyber and physical risks they face.
Scott Simkin's picture
There are fundamentals that have stood the test of time and can help prevent successful cyber breaches from occurring despite the pace at which the landscape shifts.
Adam Meyer's picture
Threat intelligence playbooks that support strategic and operational levels help teams be more effective, more certain in their actions and allow security programs to be agile/maintained as situations change.
Alastair Paterson's picture
The Equifax breach has had a damaging impact on the company and has put its customers at risk. But it has also served as a wake-up call for organizations around the globe.
Jennifer Blatnik's picture
By taking what you know about security in the physical world and logically applying it to the virtual world, you can effectively protect your personal information.
Rafal Los's picture
With the many strategy development workshops in which I’ve successfully engaged, it’s hard to believe how many companies struggle with stakeholders as a starting point.
Justin Fier's picture
When third-parties are integrated onto the network, threats are bound to slip through the cracks, and the Equifax hack demonstrated how easy it is for a subtle threat to develop into a debilitating data breach.