Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Other noteworthy stories that might have slipped under the radar: vulnerabilities at 277 water systems, DoD employee acting as money mule, 200 airports exposed by flaw.

Check Point has acquired Israeli cybersecurity companies Cyata, Cyclops, and Rotate.

Hackers stole personal information such as names, addresses, and phone numbers from a customer contact system.

Exploitation attempts target CVE-2026-1731, a critical unauthenticated remote code execution flaw in BeyondTrust Remote Support.

Disclosed at the end of January, the SolarWinds vulnerability was likely exploited as a zero-day since December 2025.

Three of the security defects are high-severity flaws, two of which were found and reported by Google.

Rewards for exploits are reportedly much smaller than in the contest’s glory days.

Developers must view AI as a collaborator to be closely monitored, rather than an autonomous entity to be unleashed. Without such a mindset, crippling tech debt is inevitable.

The company says hackers stole the personal information of patients of affiliated physicians and practices.

Windows will have runtime safeguards enabled by default, ensuring that only properly signed software runs.

Threat actors from Russia, China, North Korea and Iran have been observed launching attacks.

The company will use the investment to scale operations and deepen intelligence and automation.

Impacting the ‘dyld’ system component, the memory corruption issue can be exploited for arbitrary code execution.

BeyondTrust vulnerability BeyondTrust vulnerability

Exploitation attempts target CVE-2026-1731, a critical unauthenticated remote code execution flaw in BeyondTrust Remote Support.

Tianfu Cup hacking competition Tianfu Cup hacking competition

Rewards for exploits are reportedly much smaller than in the contest’s glory days.

Defense industry cyber threats Defense industry cyber threats

Threat actors from Russia, China, North Korea and Iran have been observed launching attacks.

Top Cybersecurity Headlines

Impacting the ‘dyld’ system component, the memory corruption issue can be exploited for arbitrary code execution.

The Conduent data breach affects at least 25 million individuals, up from 10 million estimated a few months ago. 

Day became a professional hacker by choice. But that doesn’t mean he isn’t a natural hacker.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Attendees will walk away with guidance for how to build robust identity defenses, unify them under a consistent security model, and ensure business operations move quickly without compromise.

Register

SecurityWeek’s 2026 Ransomware Summit will discuss a roadmap for defending the enterprise, from mitigating root causes to mastering recovery, giving security teams the critical insights needed to navigate and neutralize today’s ransomware extortion threats.

Register

Upcoming Cybersecurity Events

2026 Ransomware Resilience & Recovery Summit

SecurityWeek’s 2026 Ransomware Summit is a must-attend event for cybersecurity professionals as ransomware attacks continue to hit big-name victims across industries with ruthless efficiency.
[February 25, 2026 | Virtual]

Read More
Supply Chain Security Summit 2026

SecurityWeek’s 2026 Supply Chain Security Summit is where top security experts unpack the complexity of modern software supply chain threats and proven strategies to mitigate risk.
[March 18, 2026 | Virtual]

Read More
ICS Lockdown Virtual Event

SecurityWeek’s 2026 ICS Lockdown is an online extension of the ICS Cybersecurity Conference and will dive deep into the world of industrial cybersecurity to help those charged with protecting OT environments.
[April 29, 2026 | Virtual]

Read More
TDIR 2026 Summit

SecurityWeek’s 2026 Threat Detection & IR Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and more.
[May 20, 2026 | Virtual]

Read More

Vulnerabilities

Cybercrime

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

The startup relies on AI agents to identify software vulnerabilities and validate them before reporting.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.