Security Experts:

More Security Headlines

Apple Safari, Oracle VirtualBox and VMware Workstation were hacked on the first day of the Pwn2Own 2019 hacking competition, earning researchers a total of $240,000 in cash. [Read More]
Cisco Talos security researchers were able to leverage properties of the Universal Plug and Play (UPnP) protocol to unmask the IPv6 address of specific IPv4 hosts. [Read More]
Firefox 66 includes support for Windows Hello for Web Authentication on Windows 10, and brings patches for 21 vulnerabilities. [Read More]
Vulnerabilities recently addressed by CUJO AI in the CUJO Smart Firewall could be exploited to take over the device, Cisco Talos security researchers reveal. [Read More]
Security researchers found that SoftNAS Cloud Enterprise customers with openly exposed SoftNAS StorageCenter ports directly to the internet are vulnerable to an authenticated bypass. [Read More]
A vulnerability in Ghidra, the generic disassembler and decompiler released by the National Security Agency (NSA) in early March, could be exploited to execute code remotely, researchers say. [Read More]
A 50-year-old from Lithuania has pleaded guilty over his role in a $100 million business email compromise (BEC) scheme targeting Facebook and Google. [Read More]
Google has patched a vulnerability in its Photos service that could have been exploited via browser-based timing attacks to track users. [Read More]
Websites operated by governments within the European Union are harboring and delivering tracking cookies from the ad tech industry even though they don't rely on any advertising income. [Read More]
Norwegian metals and energy giant Norsk Hydro is working on restoring systems after being hit by ransomware, but the company says it does not plan on paying the hackers. [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Preston Hogue's picture
You should be asking yourself what your digital vapor trail says about you and its potential impact on your own reputation and the trust others have in you.
Alastair Paterson's picture
By understanding where assets are exposed, their value to attackers, and how attackers target this data, organizations can make better decisions about their defenses and improve them over time.
Grady Summers's picture
There are many pitfalls, and some simple rules that can help you make smarter decisions if you are in looking to purchase security products seen at RSA Conference.
Marc Solomon's picture
As a security professional, wouldn’t it be great to be able to focus on one thing at a time and know you’re focused on the right things to protect the organization?
Ashley Arbuckle's picture
Through market consolidation, organizations can derive exponentially more value from their security tools.
John Maddison's picture
While many organizations are struggling to secure their diverse, complex, and rapidly expanding networks, they are now facing a new challenge created by convergence.
Laurence Pitt's picture
As we continue to increase our dependency on communications networks and technologies to move tremendous amounts of data, we open up greater potential for serious disaster should they be compromised.
Erin O’Malley's picture
It’s important for IT security teams to understand the slight, but potentially significant difference between MFA and two-factor (2FA) authentication.
Josh Lefkowitz's picture
Josh Lefkowitz shares—and debunks—some of the most persistent and misleading BRI fallacies he has heard over the years.
Seema Haji's picture
As industrial environments become more complex, data-type and data-source agnostic technologies need to be employed. Both IT and OT teams should be able to quickly access and analyze all data relevant to their needs.