Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Experts say this is the second-largest Microsoft Patch Tuesday ever based on CVE count.

Critical ColdFusion vulnerabilities are the most at risk of being exploited in attacks, according to the software giant.

CISOs face a shrinking window to prepare as AI models like Mythos collapse the gap between vulnerability discovery and exploitation, driving a new era of high-velocity cyberattacks.

Basic-Fit has reported that hackers have stolen names, dates of birth, and even bank account details. 

The company has released 19 new security notes addressing flaws in over a dozen enterprise products.

The sprawling cybercrime operation abuses major providers to prevent takedowns and distance itself from sanctions.

The parser is meant to mitigate the entire class of memory safety bugs in the low-level environment.

The company said in an SEC filing that an IDOR vulnerability affecting RCI Internet Services exposed contractor data.

The security defects allow attackers to escalate privileges and execute arbitrary code remotely.

The online travel platform has not said how many customers’ booking information was exposed, but said the issue has been contained. 

Claims that “Microsoft is running one of the largest corporate espionage operations in modern history” face scrutiny as researchers analyze LinkedIn’s browser extension probing

The AI giant is taking action after determining that a macOS code signing certificate may have been compromised.

Law enforcement in the US, UK and Canada identified more than $45 million in cryptocurrency and froze $12 million.

Claude Mythos Claude Mythos

CISOs face a shrinking window to prepare as AI models like Mythos collapse the gap between vulnerability discovery and exploitation, driving a new era of high-velocity cyberattacks.

RCI Hospitality cyberattack RCI Hospitality cyberattack

The company said in an SEC filing that an IDOR vulnerability affecting RCI Internet Services exposed contractor data.

Booking hacked Booking hacked

The online travel platform has not said how many customers’ booking information was exposed, but said the issue has been contained. 

Top Cybersecurity Headlines

Download links were replaced by a Russian-speaking threat actor to distribute a recently emerged malware named STX RAT.

The feature allows enterprise users to compose and read end-to-end encrypted messages natively on their mobile devices.

The vulnerability is tracked as CVE-2026-34621 and Adobe has confirmed that it can be exploited for arbitrary code execution.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With “Shadow AI” usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

Upcoming Cybersecurity Events

TDIR 2026 Summit

SecurityWeek’s 2026 Threat Detection & IR Summit will bring together security practitioners from around the world to share war stories on breaches, APT attacks and more.
[May 20, 2026 | Virtual]

Read More
CISO Forum 2026 Mid-Year Review Roundtable

SecurityWeek’s CISO Forum 2026 Mid-Year Review is a virtual roundtable to evaluate the year’s most pressing challenges and share critical updates shaping the 2026 security landscape.
[June 10, 2026 | Virtual]

Read More
Cloud Security Summit 2026

SecurityWeek’s 2026 Cloud Security Summit will help organizations learn how to utilize tools, controls, and design models needed to properly secure cloud environments.
[July 15, 2026 | Virtual]

Read More
CodeSecCon 2026

SecurityWeek’s CodeSecCon 2026 will bring together developers and cybersecurity professionals to revolutionize the way applications are built, secured, and maintained.
[August 19, 2026 | Virtual]

Read More

Vulnerabilities

Cybercrime

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

A long-lived NPM access token was used to bypass the GitHub Actions OIDC-based CI/CD publishing workflow and push backdoored package versions.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.