Security Experts:

More Security Headlines

A vulnerability related to the IP-in-IP tunneling protocol that can be exploited for DoS attacks and to bypass security controls has been found to impact devices from Cisco and other vendors. [Read More]
Apple releases security patches to address a zero-day vulnerability that had been used to jailbreak iPhones running iOS 13.5. [Read More]
The cybercriminals behind the Sodinokibi/REvil ransomware have started leaking data stolen from UK electricity market administrator Elexon. [Read More]
A DDoS attack crippled the websites and systems of Minneapolis late last week, but no data appears to have been breached. [Read More]
Zscaler has acquired Edgewise Networks, a company that helps customers secure application-to-application communications using a zero-trust approach through microsegmentation. [Read More]
An unprotected AWS S3 bucket exposed the data of 2,700 users who signed up for the Joomla Resources Directory. [Read More]
A security researcher claims Apple paid a $100,000 bug bounty reward for a critical vulnerability in “Sign in with Apple,” the company’s privacy-focused authentication system. [Read More]
Two researchers have discovered a new timing channel attack technique that remains effective even if multiple processes are running on a system. [Read More]
Amtrak is informing some customers that their personal information may have been compromised after someone accessed their Guest Reward account. [Read More]
VMware has updated the macOS version of Fusion to fix a privilege escalation vulnerability introduced by a previous patch. [Read More]

SecurityWeek Experts

rss icon

Galina Antova's picture
When your core business operations, digital transformation initiatives and workers’ ability to do their jobs are at risk, effective OT security must become just as ubiquitous
John Maddison's picture
By combining ML and AI with a team of advanced cybersecurity professionals to deploy true AI-driven security operations, organizations can stay a step ahead of cybercriminals.
Laurence Pitt's picture
Every business is likely to be subject to cyberattacks at some point, and the option is to either take on the cost of putting measures in place before it happens or paying to clean up after.
Torsten George's picture
Today’s economic climate exacerbates risks of insider threats, as pending furloughs or pay cuts may tempt employees to exfiltrate data to secure a new job, make up for income losses, etc.
Joshua Goldfarb's picture
Most security organizations realize that, regardless of how much progress they’ve made towards improving maturity and efficiency, there is still more work to be done.
Idan Aharoni's picture
Many organizations are steadfast in their belief that dark web monitoring is a critical part of their security operations and the security industry is happy to fuel that belief.
Marc Solomon's picture
With an extensible platform and flexible data model, you can take full advantage of the volume and variety of data to gain insights, and the technologies in your ecosystem to accelerate detection and response and mitigate risk.
Alastair Paterson's picture
Researchers have undertaken a deep dive into the shadowy, cyber world of those whose work involves abusing others online through trickery, extortion, fraud, and theft resulting from COVID-19.
Galina Antova's picture
Eliminate complexity, align IT and OT teams, and simplify governance are my top three recommendations for how to bridge the IT-OT security gap.
Jim Ducharme's picture
Heightened anxiety is a normal consequence of drastic change, and it’s natural for the entire organization to be stressed by the shift to a fully remote work environment.