Security Experts:

More Security Headlines

Quarkslab has published technical details on a critical vulnerability in Google’s Titan M chip that could lead to code execution with elevated privileges. [Read More]
The Cl0p ransomware group claims to have accessed SCADA systems at a UK water company, but their claims about being able to control chemicals could be overblown. [Read More]
Signal says Twilio hackers attempted to re-register the phone numbers of a small percentage of its users to new devices. [Read More]
Zoom has patched high-severity macOS application vulnerabilities disclosed by a researcher at the DEF CON conference. [Read More]
Shares in British cyber security firm Darktrace soared Tuesday, reflecting a possible takeover worth several billion pounds by a US private equity firm. [Read More]
Three Nigerians were extradited from the UK to the US to face charges in relation to their roles in business email compromise (BEC) fraud schemes. [Read More]
Microsoft has announced another major disruption of an APT actor believed to be linked to the Russian government, cutting off access to accounts used for pre-attack reconnaissance, phishing, and email harvesting. [Read More]
Lawyers for WikiLeaks founder Julian Assange sued the US Central Intelligence Agency and its former director Mike Pompeo, alleging it recorded their conversations and copied data from their phones and computers. [Read More]
Cyble has observed a spike in attacks targeting port 5900, the default port for VNC, and warns that 8,000 internet-accessible VNC instances have authentication disabled. [Read More]
Eurosoft, New Horizon Datasys, and CryptoPro Secure Disk bootloaders, which are present on many devices made in the past 10 years, are affected by Secure Boot bypass vulnerabilities. [Read More]

SecurityWeek Experts

rss icon

Laurence Pitt's picture
It was great to be back in-person at security events, and I enjoyed meeting with people and discussing our solutions face-to-face.
Galina Antova's picture
Over the last few years, the pandemic and work from home paradigm shift have accelerated the convergence of IT and OT networks and necessitated a consolidated strategy to address cyber risks across cyber-physical systems (CPS).
Marc Solomon's picture
Security orchestration is about getting multiple systems in the Security Operations Center (SOC) to work together so you can detect, remediate and respond across the infrastructure.
John Maddison's picture
Digital acceleration, user demand, and shifting business strategies add new edges to the network, making it increasingly difficult to manage and even harder to secure.
Jeff Orloff's picture
The Defense Readiness Index is a reliable alternative for assessing a security team’s skill level, developing a roadmap for improving cyber competencies, and reaching the optimal level of cyber security readiness.
Joshua Goldfarb's picture
We can learn a valuable lesson about better fraud decision-making from restaurant choosing scenarios.
Derek Manky's picture
Malware and targeted attacks on operating systems and firmware have become increasingly destructive in nature, and these more nefarious attack methods are rising in prevalence.
Landon Winkelvoss's picture
Fusion centers are able to converge cyber and physical security, close gaps in coverage, and scale security to protect facilities and hundreds of thousands of employees.
Galina Antova's picture
There are no easy solutions to close the operational technology (OT) cybersecurity talent gap, but here are few ideas to help you get started.
Torsten George's picture
Digital experience monitoring technology goes beyond the monitoring of resources and applications, allowing for automated remediation and uncompromised user productivity.