Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

The funding was raised over Series A and seed funding rounds for its supply chain security solution.

As only data exfiltration for extortion no longer delivers ROI, ransomware gangs may increasingly encrypting data for additional leverage.

The Series B funding round brings the cybersecurity startup’s total raised to $60 million.

Significant cybersecurity M&A deals announced by CrowdStrike, Infoblox, JumpCloud, LevelBlue, OneSpan, and Radware.

Vulnerable SolarWinds Web Help Desk instances were exploited in December 2025 for initial access.

SmarterTools says customers were impacted after hackers compromised a data center used for quality control testing.

The KEV list is useful but largely misunderstood. KEVology explains what it is, and how best to use it.

The signs of a cyberattack were identified on systems EU’s main executive body uses for mobile device management.

Edge devices that are no longer supported have been targeted in attacks by state-sponsored hackers, the US says.

Potential breach at Flickr exposes usernames, email addresses, IP addresses, and activity data.

Other noteworthy stories that might have slipped under the radar: AT&T and Verizon response to Salt Typhoon, AI agents solve security challenges, man arrested in Poland for DDos Attacks.

Living off the AI isn’t a hypothetical but a natural continuation of the tradecraft we’ve all been defending against, now mapped onto assistants, agents, and MCP.

The startup aims to unify SOC, GRC, IAM, vulnerability management, IT, and business operations through its Agentic OS platform.

CISA KEV CISA KEV

The KEV list is useful but largely misunderstood. KEVology explains what it is, and how best to use it.

European Union cybersecurity European Union cybersecurity

The signs of a cyberattack were identified on systems EU’s main executive body uses for mobile device management.

Flickr Flickr

Potential breach at Flickr exposes usernames, email addresses, IP addresses, and activity data.

Top Cybersecurity Headlines

The security defect allows unauthenticated attackers to execute arbitrary code remotely via malicious HTTP requests.

CISA updated 59 KEV entries in 2025 to specify that the vulnerabilities have been exploited in ransomware attacks.

Zscaler says the acquisition will allow customers to embed lightweight extensions into any browser, providing increased security and eliminating the need for third-party browsers. 

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Attendees will walk away with guidance for how to build robust identity defenses, unify them under a consistent security model, and ensure business operations move quickly without compromise.

Register

SecurityWeek’s 2026 Ransomware Summit will discuss a roadmap for defending the enterprise, from mitigating root causes to mastering recovery, giving security teams the critical insights needed to navigate and neutralize today’s ransomware extortion threats.

Register

Upcoming Cybersecurity Events

2026 Ransomware Resilience & Recovery Summit

SecurityWeek’s 2026 Ransomware Summit is a must-attend event for cybersecurity professionals as ransomware attacks continue to hit big-name victims across industries with ruthless efficiency.
[February 25, 2026 | Virtual]

Read More
Supply Chain Security Summit 2026

SecurityWeek’s 2026 Supply Chain Security Summit is where top security experts unpack the complexity of modern software supply chain threats and proven strategies to mitigate risk.
[March 18, 2026 | Virtual]

Read More
ICS Lockdown Virtual Event

SecurityWeek’s 2026 ICS Lockdown is an online extension of the ICS Cybersecurity Conference and will dive deep into the world of industrial cybersecurity to help those charged with protecting OT environments.
[April 29, 2026 | Virtual]

Read More
TDIR 2026 Summit

SecurityWeek’s 2026 Threat Detection & IR Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and more.
[May 20, 2026 | Virtual]

Read More

Vulnerabilities

Cybercrime

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

VS Code-integrated configuration files are automatically executed in Codespaces when the user opens a repository or pull request.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.