Andrada Fiscutean

Andrada Fiscutean is a technology journalist and radio news editor. She writes about hackers, malware, women in tech and companies based in Eastern Europe.

Why more zero-day vulnerabilities are being found in the wild

Cybersecurity researchers face real-life threats

Cybersecurity researchers face real-life threats

Investigations into both cybercriminal and nation-state actors can have consequences. Some researchers have upgraded their physical security.

Linux malware is on the rise—6 types of attacks to look for

Linux malware is on the rise—6 types of attacks to look for

Malware targeting Linux environments has increased massively in the past year, with threat actors using a variety of techniques to carry out operations.

Zero-click attacks explained, and why they are so dangerous

Zero-click attacks explained, and why they are so dangerous

Zero-click attacks, especially when combined with zero-day vulnerabilities, are difficult to detect and becoming more common.

10 NFT and cryptocurrency security risks that CISOs must navigate

10 NFT and cryptocurrency security risks that CISOs must navigate

Decentralized technologies may raise CISOs anxiety levels, but there are ways to ward off security risks.

Making security a more welcoming field for women

Making security a more welcoming field for women

Job postings that suggest a frat house mindset, work-life imbalance, and pay gaps are among the areas companies should focus on if they want to hire and keep more women cybersecurity professionals.

Why you can't trust AI-generated autocomplete code to be secure

Why you can't trust AI-generated autocomplete code to be secure

Artificial intelligence-powered tools such as GitHub Pilot and Tabnine offer developers autocomplete suggestions that help them write code faster. How do they ensure this code is secure?

How blockchain investigations work

How blockchain investigations work

Blockchain intelligence companies can trace bitcoin and other cryptocurrency transactions to help ransomware victims understand who the attacker is and perhaps how they can get their money back.

22 cybersecurity myths organizations need to stop believing in 2022

22 cybersecurity myths organizations need to stop believing in 2022

Security teams trying to defend their organizations need to adapt quickly to new challenges. Yesterday’s buzzwords and best practices have become today’s myths.

The emotional stages of a data breach: How to deal with panic, anger, and guilt

The emotional stages of a data breach: How to deal with panic, anger, and guilt

Intense situations require both the security experts and stakeholders to be calm and focused, but that is easier said than done. This advice can help.

Malware variability explained: Changing behavior for stealth and persistence

Malware variability explained: Changing behavior for stealth and persistence

More malware is designed to be variable, choosing which computers to infect or even the type of attack to execute.

Why are people so bad at risk assessment? Blame the brain

Why are people so bad at risk assessment? Blame the brain

Stakeholders and CISOs tend to have different perspectives on estimating the risk of a potential cybersecurity incident. Understanding the psychological aspects can help bridge the gap.

Load More