Security Experts:

More Security Headlines

Several critical remote code execution vulnerabilities have been found by Cisco Talos researchers in a PDF file processing product from Aspose. [Read More]
A previously undocumented hacking group called Tortoiseshell is using custom and off-the-shelf malware to target technology companies in Saudi Arabia in what appears to be supply chain attacks. [Read More]
A new threat actor tracked as Panda has generated thousands of dollars in Monero using RATs and cryptocurrency mining malware. [Read More]
The US Justice Department filed a lawsuit against Edward Snowden seeking to prevent the former CIA employee and National Security Agency contractor from profiting from his new book. [Read More]
Industry professionals comment on a report that an unprotected database may have exposed the details of nearly everyone in Ecuador. [Read More]
Bochum, Germany-based VMRay has closed a $10 million Series B funding round led by Digital+ Partners, bringing the total raised to date to just under $14 million [Read More]
Recently discovered cryptocurrency mining malware targeting Linux machines is employing kernel-mode rootkits in an attempt to make detection more difficult. [Read More]
A vulnerability in the AMD ATI Radeon ATIDXX64.DLL driver could be triggered from within a VMware guest to execute code on the host. [Read More]
Oracle expands its portfolio with three new services designed to help automatically protect cloud workloads and data. [Read More]
Australia reportedly determined that China hacked its parliament and political parties, but decided not to make public accusations to avoid disrupting trade relations. [Read More]

ICS Cyber Security Conference

SecurityWeek Experts

rss icon

Jim Gordon's picture
Intel's Jim Gordon presents critical top 10 tactical action items every SMB should take to protect itself.
Seema Haji's picture
Enormous bandwidth increases of 5G, the rapid expansion of edge computing and countless new IoT devices introduce risk despite their intended benefit.
Gunter Ollmann's picture
Any bug hunter, security analyst, software vendor, or device manufacturer should not rely on CVSS as the pointy end of the stick for prioritizing remediation.
John Maddison's picture
Intent-based segmentation, deception technology, and an integrated security fabric are essential tools in beating malware designed to avoid detection and analysis.
Marc Solomon's picture
Visualization holds the key for quickly understanding patterns and determining which threads to pull.
Torsten George's picture
While the urge to hack back after a data breach is very appealing, going back to the basics and applying proper cyber hygiene is a better alternative.
Joshua Goldfarb's picture
The Segway can offer us more security insight that we might initially realize. It is in this spirit that I offer five ways in which a Segway can instruct us as to how to improve our security programs and security postures.
Josh Lefkowitz's picture
No organization is fully immune to ransomware attacks, which is why having a comprehensive and well-tested incident response (IR) plan can make all the difference.
John Maddison's picture
Many cybersecurity companies claim to have introduced AI capabilities into their solutions, but most fall short of true AI because their underlying infrastructure is too small or their learning models are incomplete.
Laurence Pitt's picture
Black Hat 2019 recently wrapped in Las Vegas, where somewhere between 15,000 and 20,000 experts descended to experience the latest developments in the world of cybersecurity.