Andrada Fiscutean

Andrada Fiscutean is a technology journalist and radio news editor. She writes about hackers, malware, women in tech and companies based in Eastern Europe.

Zero-click attacks explained, and why they are so dangerous

10 NFT and cryptocurrency security risks that CISOs must navigate

10 NFT and cryptocurrency security risks that CISOs must navigate

Decentralized technologies may raise CISOs anxiety levels, but there are ways to ward off security risks.

Making security a more welcoming field for women

Making security a more welcoming field for women

Job postings that suggest a frat house mindset, work-life imbalance, and pay gaps are among the areas companies should focus on if they want to hire and keep more women cybersecurity professionals.

Why you can't trust AI-generated autocomplete code to be secure

Why you can't trust AI-generated autocomplete code to be secure

Artificial intelligence-powered tools such as GitHub Pilot and Tabnine offer developers autocomplete suggestions that help them write code faster. How do they ensure this code is secure?

How blockchain investigations work

How blockchain investigations work

Blockchain intelligence companies can trace bitcoin and other cryptocurrency transactions to help ransomware victims understand who the attacker is and perhaps how they can get their money back.

22 cybersecurity myths organizations need to stop believing in 2022

22 cybersecurity myths organizations need to stop believing in 2022

Security teams trying to defend their organizations need to adapt quickly to new challenges. Yesterday’s buzzwords and best practices have become today’s myths.

The emotional stages of a data breach: How to deal with panic, anger, and guilt

The emotional stages of a data breach: How to deal with panic, anger, and guilt

Intense situations require both the security experts and stakeholders to be calm and focused, but that is easier said than done. This advice can help.

Malware variability explained: Changing behavior for stealth and persistence

Malware variability explained: Changing behavior for stealth and persistence

More malware is designed to be variable, choosing which computers to infect or even the type of attack to execute.

Why are people so bad at risk assessment? Blame the brain

Why are people so bad at risk assessment? Blame the brain

Stakeholders and CISOs tend to have different perspectives on estimating the risk of a potential cybersecurity incident. Understanding the psychological aspects can help bridge the gap.

How corporate data and secrets leak from GitHub repositories

How corporate data and secrets leak from GitHub repositories

Attackers constantly search public code repositories like GitHub for secrets developers might inadvertently leave behind, and any tiny mistake can be exploited.

Steganography explained and how to protect against it

Steganography explained and how to protect against it

Steganography is reasonably easy to implement yet difficult to detect, which is why threat actors use it to deliver malware, evade detection, and gain persistence.

5 best practices for designing application logs

5 best practices for designing application logs

Better logs make it easier to distinguish between critical data and noise. Here's how to design logs with security in mind.

Load More