Andrada Fiscutean

Andrada Fiscutean is a technology journalist and radio news editor. She writes about hackers, malware, women in tech and companies based in Eastern Europe.

Why more zero-day vulnerabilities are being found in the wild

Cybersecurity researchers face real-life threats

Cybersecurity researchers face real-life threats

Investigations into both cybercriminal and nation-state actors can have consequences. Some researchers have upgraded their physical security.

Linux malware is on the rise—6 types of attacks to look for

Linux malware is on the rise—6 types of attacks to look for

Malware targeting Linux environments has increased massively in the past year, with threat actors using a variety of techniques to carry out operations.

Zero-click attacks explained, and why they are so dangerous

Zero-click attacks explained, and why they are so dangerous

Zero-click attacks, especially when combined with zero-day vulnerabilities, are difficult to detect and becoming more common.

10 NFT and cryptocurrency security risks that CISOs must navigate

10 NFT and cryptocurrency security risks that CISOs must navigate

Decentralized technologies may raise CISOs anxiety levels, but there are ways to ward off security risks.

Making security a more welcoming field for women

Making security a more welcoming field for women

Job postings that suggest a frat house mindset, work-life imbalance, and pay gaps are among the areas companies should focus on if they want to hire and keep more women cybersecurity professionals.

Why you can't trust AI-generated autocomplete code to be secure

Why you can't trust AI-generated autocomplete code to be secure

Artificial intelligence-powered tools such as GitHub Pilot and Tabnine offer developers autocomplete suggestions that help them write code faster. How do they ensure this code is secure?

How blockchain investigations work

How blockchain investigations work

Blockchain intelligence companies can trace bitcoin and other cryptocurrency transactions to help ransomware victims understand who the attacker is and perhaps how they can get their money back.

22 cybersecurity myths organizations need to stop believing in 2022

22 cybersecurity myths organizations need to stop believing in 2022

Security teams trying to defend their organizations need to adapt quickly to new challenges. Yesterday’s buzzwords and best practices have become today’s myths.

The emotional stages of a data breach: How to deal with panic, anger, and guilt

The emotional stages of a data breach: How to deal with panic, anger, and guilt

Intense situations require both the security experts and stakeholders to be calm and focused, but that is easier said than done. This advice can help.

Malware variability explained: Changing behavior for stealth and persistence

Malware variability explained: Changing behavior for stealth and persistence

More malware is designed to be variable, choosing which computers to infect or even the type of attack to execute.

Why are people so bad at risk assessment? Blame the brain

Why are people so bad at risk assessment? Blame the brain

Stakeholders and CISOs tend to have different perspectives on estimating the risk of a potential cybersecurity incident. Understanding the psychological aspects can help bridge the gap.

How corporate data and secrets leak from GitHub repositories

How corporate data and secrets leak from GitHub repositories

Attackers constantly search public code repositories like GitHub for secrets developers might inadvertently leave behind, and any tiny mistake can be exploited.

Steganography explained and how to protect against it

Steganography explained and how to protect against it

Steganography is reasonably easy to implement yet difficult to detect, which is why threat actors use it to deliver malware, evade detection, and gain persistence.

5 best practices for designing application logs

5 best practices for designing application logs

Better logs make it easier to distinguish between critical data and noise. Here's how to design logs with security in mind.

The most dangerous (and interesting) Microsoft 365 attacks

The most dangerous (and interesting) Microsoft 365 attacks

APT groups are developing new techniques that allow them to avoid detection and exfiltrate hundreds of gigabytes of data from emails, SharePoint, OneDrive, and other applications.

How to control ransomware? International cooperation, disrupting payments are key, experts say

How to control ransomware? International cooperation, disrupting payments are key, experts say

Anti-ransomware acts or regulations will require global cooperation, experts say. In the meantime, ransomware victims should cooperate quickly and fully with authorities.

The 10 most dangerous cyber threat actors

The 10 most dangerous cyber threat actors

These are the most notorious global cybercriminal and state-sponsored groups according to security researchers.

Hacktivism’s reemergence explained: Data drops and defacements for social justice

Hacktivism’s reemergence explained: Data drops and defacements for social justice

A record amount of leaked data to expose far-right groups signals a more focused and serious approach to hacking for a cause. To understand the risk, CISOs should pay attention to the news.

Booming dark web gig economy is a rising threat

Booming dark web gig economy is a rising threat

Experts seen a sharp increase in help-wanted ads for black hat hackers-for-hire. Here's what they are targeting and how to respond to the threat.

Load More