Security Experts:

More Security Headlines

Ireland's data regulator on slapped Facebook owner Meta with a 265-million-euro ($275-million) fine after details of more than half a billion users were leaked on a hacking website. [Read More]
The Bahamut APT has been targeting Android users with trojanized versions of the legitimate VPN applications SoftVPN and OpenVPN. [Read More]
Interpol has announced the arrest of ten individuals in Africa linked to scam and fraud activities worth roughly $800,000. [Read More]
A massive Twitter data breach disclosed a few months ago appears to be bigger than initially reported, possibly with over 100 million accounts impacted. [Read More]
Vulnerabilities in Cisco ISE could lead to the injection of arbitrary commands, security protection bypass, and XSS attacks. [Read More]
Google releases emergency Chrome update to address actively exploited zero-day vulnerability. [Read More]
US authorities announced a ban on the import or sale of communications equipment deemed "an unacceptable risk to national security" -- including gear from Chinese giants Huawei Technologies and ZTE. [Read More]
The European Parliament website was hit by a cyberattack claimed by pro-Russian hackers shortly after lawmakers approved a resolution calling Moscow a "state sponsor of terrorism". [Read More]
Security researchers at Proofpoint call attention to the discovery of a commercial red-teaming attack tool called Nighthawk, warning that the command-and-control framework is likely to be abused by threat actors. [Read More]
A cross-tenant vulnerability in AWS abused the AppSync service to provide access to resources within a target organization’s account. [Read More]

SecurityWeek Experts

rss icon

Derek Manky's picture
Linux systems are a popular delivery mechanism for malware. While they’re not the most popular – that distinction goes to HTML and Javascript – don’t think you can ignore them.
Galina Antova's picture
Over the last few years, the majority of large enterprises have come a long way in defining their operational technology (OT) governance strategies and making meaningful advances in risk reduction.
Marc Solomon's picture
Even though things have changed—from SOAR to XDR to CSMA—they have also stayed the same. These new categories are not solutions but really architectures.
Landon Winkelvoss's picture
Organizations need to be able to go outside the firewall to gather as much threat actor information as possible to build robust internal defenses against fraud.
Jeff Orloff's picture
Nothing can ever prepare an organization for every ransomware scenario. However, if you train for multiple situations, your team will be able to make decisions more quickly, and react appropriately when an unforeseen incident occurs.
Laurence Pitt's picture
Between the excitement and the comfort of working from home, it can be easy to overlook the risks associated with summer travel, but it’s important to remain careful and vigilant.
Keith Ibarguen's picture
It is encouraging to see the many strategic activities happening in cyber policy among the world’s most powerful nations.
Derek Manky's picture
We hear a lot about drug mules, but what are cyber mules? It’s similar to how drug dealers rely on unsuspecting or otherwise vulnerable people to help them transport drugs or launder the proceeds of those sales.
John Maddison's picture
Universal ZTNA is the easiest and most effective way to ensure that every user and device has secure access to the applications they need to do their jobs.
Torsten George's picture
When establishing visibility and security controls across endpoints, security practitioners need to understand that each endpoint bears some or all responsibility for its own security.