Security Experts:

More Security Headlines

Google has released Chrome 106 to the stable channel with patches for 20 vulnerabilities, including 16 externally reported bugs. [Read More]
Facebook says it has identified and stopped a sprawling network of fake accounts that spread Russian propaganda about the invasion of Ukraine throughout Western Europe. [Read More]
SentinelLabs researchers are kick-starting a crowdsourced effort to understand a new mysterious APT hitting hitting telcos, ISPs and universities in the Middle East and Africa. [Read More]
Cybersecurity firm Human disrupts Scylla ad fraud campaign consisting of 89 mobile applications that gathered over 13 million downloads. [Read More]
Civil rights lawyers and senators are pushing for legislation that would limit U.S. law enforcement agencies’ ability to buy cellphone tracking tools to follow people’s whereabouts. [Read More]
GuidePoint Security launches industrial control systems (ICS) security service offerings, including security program review and penetration testing. [Read More]
Security researchers are warning of a new information stealer named Erbium being distributed as Malware-as-a-Service (MaaS). [Read More]
Elbit Systems of America has confirmed suffering a breach after the Black Basta ransomware gang claimed to have stolen data from the company’s systems. [Read More]
A class action lawsuit filed against Samsung alleges that the company unnecessarily collected user data, then stored and sold it without proper security protections. [Read More]
WhatsApp updates patch two critical and high-severity remote code execution vulnerabilities related to video calls and video files. [Read More]

SecurityWeek Experts

rss icon

Torsten George's picture
Unfortunately, there is no such thing as 100 percent protection. Therefore, we cannot solely focus on “Left of Boom” processes, but also have to talk about the “Right of Boom”.
Marc Solomon's picture
Cyberattacks and data breaches continue to rise year-over-year and another so-called silver bullet technology isn’t going to stop that trend.
Joshua Goldfarb's picture
Looking long is an important skill for security and fraud teams to develop. Strong leadership, a focus on achieving impactful long-term goals, and the discipline to achieve those goals are all important parts of the game.
William Lin's picture
AppSec is key to protecting production workloads from modern threats, but there are still too many silos and too much friction in existing implementations.
Derek Manky's picture
Linux systems are a popular delivery mechanism for malware. While they’re not the most popular – that distinction goes to HTML and Javascript – don’t think you can ignore them.
Galina Antova's picture
Over the last few years, the majority of large enterprises have come a long way in defining their operational technology (OT) governance strategies and making meaningful advances in risk reduction.
Marc Solomon's picture
Even though things have changed—from SOAR to XDR to CSMA—they have also stayed the same. These new categories are not solutions but really architectures.
Landon Winkelvoss's picture
Organizations need to be able to go outside the firewall to gather as much threat actor information as possible to build robust internal defenses against fraud.
Jeff Orloff's picture
Nothing can ever prepare an organization for every ransomware scenario. However, if you train for multiple situations, your team will be able to make decisions more quickly, and react appropriately when an unforeseen incident occurs.
Laurence Pitt's picture
Between the excitement and the comfort of working from home, it can be easy to overlook the risks associated with summer travel, but it’s important to remain careful and vigilant.