Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Federal agencies warn attackers are manipulating PLC and SCADA systems across multiple sectors, triggering operational disruptions and raising concerns over broader OT targeting.

New AI model drives Project Glasswing, a effort to secure critical software before advanced capabilities fall into the wrong hands.

The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural.

The startup has created a layered security solution aiming to secure AI agents throughout their entire lifecycle.

The improper validation of user-supplied JavaScript code allows attackers to execute arbitrary code and access the file system.

A critical DoS vulnerability in the Framework component of Android has also been fixed with the latest update.

By targeting Grafana’s AI components, attackers can point to external resources and inject indirect prompts to bypass safeguards.

Join the live diagnostic session to expose hidden coverage gaps and shift from flawed tool-level evaluations to a comprehensive, program-level validation discipline.

Researchers have demonstrated that GPU Rowhammer attacks can be used to escalate privileges.

The group is using zero-days, quickly weaponizes fresh bugs, and exfiltrates and encrypts data within days of initial access.

Shchukin is accused of extorting more than $2 million as the head of the GandCrab and REvil ransomware operations.

The Trump administration says the FY2027 budget refocuses CISA on its core mission: protecting federal agencies and critical infrastructure.

The high-end casino and hotel operator has likely paid a ransom to avoid a data leak.

Iranian Hackers Iranian Hackers

Federal agencies warn attackers are manipulating PLC and SCADA systems across multiple sectors, triggering operational disruptions and raising concerns over broader OT targeting.

Claude Mythos Claude Mythos

New AI model drives Project Glasswing, a effort to secure critical software before advanced capabilities fall into the wrong hands.

CISA CISA

The Trump administration says the FY2027 budget refocuses CISA on its core mission: protecting federal agencies and critical infrastructure.

Top Cybersecurity Headlines

The high-end casino and hotel operator has likely paid a ransom to avoid a data leak.

The improper access control bug in FortiClient EMS allows unauthenticated attackers to execute arbitrary code remotely.

Hackers stole over 300GB of data from the Commission’s AWS environment, including personal information.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join our live diagnostic session to expose hidden coverage gaps and shift from flawed tool-level evaluations to a comprehensive, program-level validation discipline.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

Upcoming Cybersecurity Events

TDIR 2026 Summit

SecurityWeek’s 2026 Threat Detection & IR Summit will bring together security practitioners from around the world to share war stories on breaches, APT attacks and more.
[May 20, 2026 | Virtual]

Read More
CISO Forum 2026 Mid-Year Review Roundtable

SecurityWeek’s CISO Forum 2026 Mid-Year Review is a virtual roundtable to evaluate the year’s most pressing challenges and share critical updates shaping the 2026 security landscape.

Read More
Cloud Security Summit 2026

SecurityWeek’s 2026 Cloud Security Summit will help organizations learn how to utilize tools, controls, and design models needed to properly secure cloud environments.
[July 15, 2026 | Virtual]

Read More
CodeSecCon

SecurityWeek’s CodeSecCon 2026 will bring together developers and cybersecurity professionals to revolutionize the way applications are built, secured, and maintained.
[August 12, 2026 | Virtual]

Read More

Vulnerabilities

Cybercrime

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

A long-lived NPM access token was used to bypass the GitHub Actions OIDC-based CI/CD publishing workflow and push backdoored package versions.

ICS/OT

ICS/OT

Federal agencies warn attackers are manipulating PLC and SCADA systems across multiple sectors, triggering operational disruptions and raising concerns over broader OT targeting.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.