Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Hackers stole over 300GB of data from the Commission’s AWS environment, including personal information.

A Chinese threat actor exploited the video conferencing platform to perform reconnaissance, escalate privileges, and execute additional payloads.

Other noteworthy stories that might have slipped under the radar: Symantec vulnerability, anti-ClickFix mechanism added to macOS, FBI hack classified as major incident.

The vulnerabilities can be chained together to bypass authentication and upload arbitrary files to the server.

Shadow AI embedded in everyday apps, combined with outdated mobile devices and zero-click exploits, is creating a new and largely unseen mobile risk.

Using automated scanning and the Nexus Listener collection framework, the hackers compromised over 750 systems.

The cybersecurity incident involved an insider and had a limited impact, the telecoms giant told SecurityWeek.

The attackers prepared infrastructure and multiple nonce-based transactions, took over an admin key, and drained five vaults.

Within days of each other, Anthropic first leaked the source code to Claude Code, and then a critical vulnerability was found by Adversa AI.

The DarkSword exploit kit has been used by both state-sponsored hackers and commercial spyware vendors.

Significant cybersecurity M&A deals announced by Airbus, Cellebrite, Databricks, Quantum eMotion, Rapid7, and OpenAI.

The bugs could lead to authentication bypass, remote code execution, information disclosure, and privilege escalation.

In January 2026, a threat actor hacked the hospital’s internal network and stole personal and health information.

EU and European cyber policy EU and European cyber policy

Hackers stole over 300GB of data from the Commission’s AWS environment, including personal information.

T-Mobile data breach T-Mobile data breach

The cybersecurity incident involved an insider and had a limited impact, the telecoms giant told SecurityWeek.

Cryptocurrency heist Cryptocurrency heist

The attackers prepared infrastructure and multiple nonce-based transactions, took over an admin key, and drained five vaults.

Top Cybersecurity Headlines

Within days of each other, Anthropic first leaked the source code to Claude Code, and then a critical vulnerability was found by Adversa AI.

Significant cybersecurity M&A deals announced by Airbus, Cellebrite, Databricks, Quantum eMotion, Rapid7, and OpenAI.

The AI recruiting firm is investigating the incident as Lapsus$ claimed the theft of 4TB of Mercor data.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the webinar to understand what it really takes to close the last mile of identity security.

Register

Join our live diagnostic session to expose hidden coverage gaps and shift from flawed tool-level evaluations to a comprehensive, program-level validation discipline.

Register

Upcoming Cybersecurity Events

2026 Ransomware Resilience & Recovery Summit

SecurityWeek’s 2026 Ransomware Summit is a must-attend event for cybersecurity professionals as ransomware attacks continue to hit big-name victims across industries with ruthless efficiency.
[February 25, 2026 | Virtual]

Read More
Supply Chain Security Summit 2026

SecurityWeek’s 2026 Supply Chain Security Summit is where top security experts unpack the complexity of modern software supply chain threats and proven strategies to mitigate risk.
[March 18, 2026 | Virtual]

Read More
ICS Lockdown Virtual Event

SecurityWeek’s 2026 ICS Lockdown is an online extension of the ICS Cybersecurity Conference and will dive deep into the world of industrial cybersecurity to help those charged with protecting OT environments.
[April 29, 2026 | Virtual]

Read More
TDIR 2026 Summit

SecurityWeek’s 2026 Threat Detection & IR Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and more.
[May 20, 2026 | Virtual]

Read More

Vulnerabilities

Cybercrime

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

A long-lived NPM access token was used to bypass the GitHub Actions OIDC-based CI/CD publishing workflow and push backdoored package versions.

ICS/OT

Government

CESER’s Project Armor is a five year initiative to harden the US critical energy infrastructure, including strengthening energy systems ‘to prevent and recover from...

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.