Security Experts:

More Security Headlines

The vulnerability could lead to application crashes and potentially enable arbitrary code execution. [Read More]
Earlier this year, Aleksandr Grichishkin admitted in court to being the founder and leader of a bulletproof hosting organization. [Read More]
The Los Angeles branch of Planned Parenthood was hit by a data breach involving about 400,000 patients, but there is no indication that the information was used “for fraudulent purposes,” the group said. [Read More]
The hacker attack disclosed by Ubiquiti in January was actually conducted by a former employee, according to the Justice Department, which announced charges against the individual. [Read More]
The surge in venture capital investments in the attack surface management space continues with Israeli risk management firm CyCognito announcing a new $100 million funding round. [Read More]
Cybersecurity unicorn Aqua Security has acquired software development security company Argon for tens of millions of dollars. [Read More]
Vulnerabilities in more than 150 multi-function printers from HP demonstrate that any type of device that connects to a network can expand the perceived threat surface. [Read More]
Each collection represents a live report containing IoCs. Owners can freely add or remove IoCs. [Read More]
The number of cybersecurity-related mergers and acquisitions announced in the past months has remained constant, with 40 deals announced in November 2021. [Read More]
A total of six members of the international hacking group “The Community” have been sentenced. [Read More]

SecurityWeek Experts

rss icon

Torsten George's picture
While it might be overwhelming to look at the critical threats on the horizon you need to prepare for, focusing on these predictions for 2022 will help you strengthen your security posture and minimize your organization’s risk exposure.
Yaniv Vardi's picture
If you’re a CISO or security leader, here are three questions to ask yourself as you consider this legislation and look to improve the security posture of your OT environment.
Laurence Pitt's picture
With tight resources for managing healthcare, the IT challenge to keep track of vast amounts of data being created, accessed and modified is critical.
Marie Hattar's picture
In order to deliver on the promise of 5G, we need new industry standards for security, testing, and training to proactively combat 5G cyber threats and minimize risks.
Marc Solomon's picture
Security Operations Centers do not need another acronym. What they need are capabilities that enable them to address their top use cases faster and more thoroughly in the face of evolving attacks.
Gordon Lawson's picture
For red teams, using an obfuscated network for testing offers the advantage of hiding who is performing the attack and where it is originating, for a more real-life context
Tim Bandos's picture
There’s no doubt that there are a lot of things on your CISO’s mind. Whether they have an active role at board meetings or not, chances are these are some of the most pressing items they’d like to discuss with you.
Jeff Orloff's picture
Most organizations rely too heavily on their cybersecurity pros to protect them from threats, ignoring the painful reality that human error is by far the most common cause of security breaches.
John Maddison's picture
Recent changes have resulted in a proliferation of devices and users working from anywhere, which has expanded the digital attack surface and exposed more applications, devices, data, and users to risk.
Keith Ibarguen's picture
One of the best approaches to identifying both the value you are bringing to a customer and opportunities to increase that value is by going on the change-journey with your customers.