Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

The researcher who discovered the vulnerability saw more than 2,500 internet-exposed devices.

Operating as an access broker, the defendant sold unauthorized access to compromised networks to an undercover agent.

The information stealer abuses legitimate APIs and libraries to exfiltrate data to Discord webhooks.

Information sharing is necessary for efficient cybersecurity, and is widespread; but never quite perfect in practice.

US officials told The New York Times that cyberattacks were used to turn off the lights in Caracas and disrupt air defense radars.

Posing as an ad blocker, the malicious extension crashes the browser to lure victims into installing malware.

The compromised personal information includes names, dates of birth, Social Security numbers, and employment-related data.

Nicholas Moore pleaded guilty to repeatedly hacking the U.S. Supreme Court’s filing system and illegally accessing computer systems belonging to AmeriCorps and the Department of Veterans Affairs.

Other noteworthy stories that might have slipped under the radar: BodySnatcher agentic AI hijacking, Telegram IP exposure, shipping systems hacked by researcher.

The company will use the investment to accelerate the adoption of its solution among financial institutions and digital businesses.

The startup is building the necessary infrastructure and tools to help organizations transition to post-quantum computing.

The incident impacted the personal information of CIRO member firms and their registered employees.

Power grid security Power grid security

US officials told The New York Times that cyberattacks were used to turn off the lights in Caracas and disrupt air defense radars.

Social Engineering Social Engineering

We’ve known that social engineering would get AI wings. Now, at the beginning of 2026, we are learning just how high those wings can soar.

China - US cybersecurity China - US cybersecurity

China has more than 5,000 cybersecurity companies and all the top 20 firms are working with the government. 

Top Cybersecurity Headlines

Easterly will be leading the world-renowned cybersecurity conference and other RSAC programs.

Researchers have disclosed technical details on a new AMD processor attack that allows remote code execution inside confidential VMs.

Designed for long-term access, the framework targets cloud and container environments with loaders, implants, and rootkits.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how to protect your organization from 2026’s AI-driven threats by moving beyond legacy tools to adaptive, behavioral email security.

Register

SecurityWeek’s 2026 Ransomware Summit will discuss a roadmap for defending the enterprise, from mitigating root causes to mastering recovery, giving security teams the critical insights needed to navigate and neutralize today’s ransomware extortion threats.

Register

Upcoming Cybersecurity Events

CISO Forum 2026 Outlook Series

SecurityWeek’s CISO Forum 2026 Outlook Series is a two-part webinar series to evaluate the year’s most pressing challenges and share critical updates shaping the 2026 security landscape.
[January 14 & 21, 2026 | Virtual]

Read More
2026 Ransomware Resilience & Recovery Summit

SecurityWeek’s 2026 Ransomware Summit is a must-attend event for cybersecurity professionals as ransomware attacks continue to hit big-name victims across industries with ruthless efficiency.
[February 25, 2026 | Virtual]

Read More
Supply Chain Security Summit 2026

SecurityWeek’s 2026 Supply Chain Security Summit is where top security experts unpack the complexity of modern software supply chain threats and proven strategies to mitigate risk.
[March 18, 2026 | Virtual]

Read More
TDIR 2026 Summit

SecurityWeek’s 2026 Threat Detection & IR Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and more.
[May 20, 2026 | Virtual]

Read More

Vulnerabilities

Cybercrime

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Cloud Security

Artificial Intelligence

The agreement strengthens technical and commercial ties as Palo Alto migrates workloads and adopts Google’s Vertex AI and Gemini models.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.