Watch On Demand: CISO Forum 2025 Virtual Summit - All Sessions Available (Free)
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Security firms say the flaw has been actively exploited for weeks, even as Fortinet quietly shipped fixes and CISA added the bug to its KEV catalog.

The goal is to produce a cyber force capable of defeating threats posed by major adversaries such as China.

The CISO Forum Virtual Summit brought together CISOs, researchers, and innovators to share practical insights and strategies.

Other noteworthy stories that might have slipped under the radar: EchoGram attack undermines AI guardrails, Asahi brewer still crippled after ransomware attack, Sora 2 system prompt uncovered.

The information was stolen from a legacy cloud file storage system, not from its payment processing platform.

The media company admitted that cybercriminals attempted to extort a payment after stealing personal information. 

Akira was seen exploiting SonicWall vulnerabilities and encrypting Nutanix Acropolis Hypervisor (AHV) VM disk files this year.

A financially motivated threat actor automated the package publishing process in a coordinated tea.xyz token farming campaign.

A vulnerability in ImunifyAV can be exploited for arbitrary code execution by uploading a malicious file to shared servers.

A state-sponsored threat actor manipulated Claude Code to execute cyberattacks on roughly 30 organizations worldwide.

The cybercriminals informed customers that their cloud server was shut down due to complaints.

A researcher found a way to exploit an SSRF vulnerability related to custom GPTs to obtain an Azure access token. 

Fortinet Vulnerability Exploited Fortinet Vulnerability Exploited

Security firms say the flaw has been actively exploited for weeks, even as Fortinet quietly shipped fixes and CISA added the bug to its KEV catalog.

CISO Forum Virtual Summit CISO Forum Virtual Summit

The CISO Forum Virtual Summit brought together CISOs, researchers, and innovators to share practical insights and strategies.

Chinese APT uses Claude AI for espionage Chinese APT uses Claude AI for espionage

A state-sponsored threat actor manipulated Claude Code to execute cyberattacks on roughly 30 organizations worldwide.

Top Cybersecurity Headlines

The cybercriminals informed customers that their cloud server was shut down due to complaints.

The UK’s national healthcare system is working with the country’s National Cyber Security Centre to investigate the incident.

Amazon has seen a threat actor exploiting CVE-2025-20337 and CVE-2025-5777, two critical Cisco and Citrix vulnerabilities, as zero-days.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Designed for senior level cybersecurity leaders to discuss, share and learn innovative cybersecurity and risk management strategies.

Register

This session will explore the critical steps industrial organizations must take to effectively protect operations, achieve compliance, and ensure both operational continuity and long-term growth.

Register

Join to learn why legacy defenses fail against modern API attacks as well as the strategies organizations need to stay ahead of today’s evolving threats.

Register

Upcoming Cybersecurity Events

CISO Forum 2025 Virtual Summit - Now On-Demand

SecurityWeek’s 2025 CISO Forum Virtual Summit Designed for senior level cybersecurity leaders to discuss, share and learn innovative cybersecurity and risk management strategies.
[NOW ON-DEMAND – Virtual]

Read More

SecurityWeek’s Cyber AI & Automation Summit pushes the boundaries of security discussions by exploring the implications and applications of predictive AI, machine learning, and automation in modern cybersecurity programs.
[December 10, 2025 | Virtual]

Read More
CISO Forum 2026 Outlook Series

SecurityWeek’s CISO Forum 2026 Outlook Series is a two-part webinar series to evaluate the year’s most pressing challenges and share critical updates shaping the 2026 security landscape.
[January 14 & 21, 2025 | Virtual]

Read More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

A financially motivated threat actor automated the package publishing process in a coordinated tea.xyz token farming campaign.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.