Security Experts:

More Security Headlines

The new SSRF Dashboard allows researchers to generate internal endpoint URLs for targeting and shows the number of hits resulting from a SSRF attempt. [Read More]
Earlier this year, the United States and United Kingdom governments warned of state-sponsored adversaries abusing the same open-source tool. [Read More]
Snapchat’s corporate parent disclosed Thursday that its ad sales are being hurt by a privacy crackdown that rolled out on Apple’s iPhones earlier this year, raising investor fears that the app’s financial growth is going into a tailspin. [Read More]
A total of 17 types of vulnerabilities have been found in the Versiondog data management product made by AUVESY. [Read More]
Threat actors lure victims with fake collaboration opportunities and then use the hijacked accounts to broadcast cryptocurrency scams. [Read More]
Aura, a company that provides cybersecurity solutions for consumers, announced raising $200 million at a $2.5 billion valuation. [Read More]
Designed to redirect traffic to a custom proxy, FiveSys is the second rootkit within the past five months to feature a digital signature issued by Microsoft. [Read More]
Rhombus Systems, a provider of smart security cameras, has raised $10 million in a Series A funding round led by Cota Capital. [Read More]
The two worked for an organization providing bulletproof hosting to malware families such as Citadel, SpyEye, Zeus, and the Blackhole Exploit Kit. [Read More]
Three former executives of now defunct email security firm GigaTrust have been charged for defrauding investors and lenders in a $50 million scheme. [Read More]

SecurityWeek Experts

rss icon

Joshua Goldfarb's picture
By understanding what makes a great security practitioner, organizations can learn how to recruit and retain effective security practitioners.
William Lin's picture
While there still isn’t a clear industry-accepted answer to Vendor risk management (VRM), there has been more interest in staying on top of and learning about the latest in this space.
Keith Ibarguen's picture
Leverage the power of the collective - the network effect – for its ever-evolving intelligence wherever possible to keep your employees free of all the bad stuff that has made it to their inboxes.
Gordon Lawson's picture
Most cyber insurance providers are demanding that companies supply proof of their backup implementation in order to obtain an affordable policy.
Derek Manky's picture
Botnets are becoming more malicious, sometimes able to create hundreds of thousands of drones that can attack a variety of machines, including Mac systems, Linux, Windows systems, edge devices, IoT devices, and so on.
Marc Solomon's picture
The goal of XDR is detection and response across the infrastructure, across all attack vectors, across different vendors, and across security technologies that are cloud based and on premises.
John Maddison's picture
Zero-trust network access (ZTNA) simplifies secure connectivity by providing seamless, per-use access to applications, no matter where the user or application may be located.
Torsten George's picture
While there is no silver bullet to prevent cybersecurity attacks, ZTNA has become a necessity for organizations on their digital transformation journey by allowing to minimize the attack surface while ensuring the productivity of remote workers.
Laurence Pitt's picture
Cybersecurity Awareness Month is an excellent time to reflect on any changes made, and that might still need to be made since, as for many people hybrid has become the working ‘normal.’
Landon Winkelvoss's picture
In addition to evaluating the core capabilities and range of intelligence monitoring, organizations must consider data source integrity, and perhaps most importantly, the level of expert analysis included with each service.