Security Experts:

More Security Headlines

Apple has rolled out emergency patches for a pair of already exploited zero-day vulnerabilities in its flagship macOS and iOS platforms. Details on the attacks remain scarce. [Read More]
Trend Micro's Zero Day Initiative is ramping up the pressure on software vendors that consistently ship faulty, problematic security patches. [Read More]
There has been an increase in threats that can target and disrupt ICS systems, according to data from Honeywell. [Read More]
SEC claims 18 individuals and entities conspired with others to hack brokerage accounts to artificially increase the price of specific shares and sell their stock at the inflated prices. [Read More]
Mandiant has been tracking an activity cluster that it believes to be from a single Iranian threat group that has been targeting Israeli interests, especially shipping. [Read More]
Splunk this week released a new set of quarterly patches, to address multiple vulnerabilities in Splunk Enterprise. [Read More]
Researchers have analyzed Electron security and discovered vulnerabilities in 18 applications, including Microsoft Teams and Discord. [Read More]
Njuh Valentine Fombe has been indicted for conspiring to conduct BEC schemes targeting numerous organizations in the United States. [Read More]
Google has patched another actively exploited Chrome zero-day vulnerability, the fifth for 2022. [Read More]
Security researchers have identified more than 20 malicious PyPI packages designed to steal passwords and other sensitive information. [Read More]

SecurityWeek Experts

rss icon

Torsten George's picture
When establishing visibility and security controls across endpoints, security practitioners need to understand that each endpoint bears some or all responsibility for its own security.
Gordon Lawson's picture
Zero trust is a great way to approach security, but we need to change the paradigm to prevent threats, instead of just detecting them.
Joshua Goldfarb's picture
By understanding how to identify, isolate, and remove unwanted bot and fraud traffic, enterprises can remove the noise clouding the visibility they have into their online applications.
Marc Solomon's picture
The goal of security automation is to accelerate detection and response, but you’ll waste a lot of time if you try to eat the elephant all at once.
Laurence Pitt's picture
A well-implemented ZTNA with the ‘trust-no-one, assume nothing’ mantra is also a great tool to mitigate potential attacks.
Marie Hattar's picture
For Smart Cities to truly live up to their promise, we shouldn’t forget that – like all infrastructure – safety and security are a top priority.
Joshua Goldfarb's picture
A healthy dose of curiosity and humility can help enterprises ask the right questions, perform the right analysis, and focus on the right topics around improving their fraud programs.
Marc Solomon's picture
With an approach that is data-driven and flexible, you can get as simple or as advanced as the detection and response demands.
Derek Manky's picture
Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees’ cyber hygiene training up to date.
Gordon Lawson's picture
The adoption of IoT technology used to connect SCADA systems to the internet either directly or indirectly dramatically increases the risk of a successful exploit.