Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

The initial vulnerability was exploited by Russia-linked APT28 in attacks against Ukraine and EU countries.

A code reuse issue enabled comma characters in certificate principals to be interpreted as list separators.

The tech giant found that many indirect prompt injection attempts are harmless, but some malicious exploits have also been identified.

Itron, which serves utilities and cities around the world, discovered unauthorized access to its systems on April 13.

The threat actor infected victims with the Snow malware family – Snowbelt, Snowglaze, and Snowbasin – for persistent access.

A race condition in PackageKit allows unprivileged users to escalate privileges when installing packages.

US conducts sweeping crackdown on Southeast Asian cyberscam operations as part of what officials say is a “new theater of war”.

The vulnerability is tracked as CVE-2026-6770 and it has been patched with the release of Firefox 150 and Tor 15.0.10.

Dubbed GopherWhisper, the group relies on multiple Go-based backdoors alongside custom loaders and injectors.

It targeted high-precision calculation software to tamper with results and packed a self-propagation mechanism.

Other noteworthy stories that might have slipped under the radar: Supreme Court hacker sentenced, Lovable exposed user data, Google expands enterprise security. 

From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase.

Locked Shields has grown significantly over the past 16 years, with only four nations participating in the first edition.

Linux vulnerability Linux vulnerability

A race condition in PackageKit allows unprivileged users to escalate privileges when installing packages.

Tor Tor

The vulnerability is tracked as CVE-2026-6770 and it has been patched with the release of Firefox 150 and Tor 15.0.10.

Iran-US-Israel cyberattacks Iran-US-Israel cyberattacks

It targeted high-precision calculation software to tamper with results and packed a self-propagation mechanism.

Top Cybersecurity Headlines

Locked Shields has grown significantly over the past 16 years, with only four nations participating in the first edition.

The malware provides remote access and control of infected devices and maintains post-patching persistence.

Tied to a fresh Checkmarx supply chain attack claimed by TeamPCP, the incident references the Shai-Hulud worm.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With “Shadow AI” usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

Upcoming Cybersecurity Events

TDIR 2026 Summit

SecurityWeek’s 2026 Threat Detection & IR Summit will bring together security practitioners from around the world to share war stories on breaches, APT attacks and more.
[May 20, 2026 | Virtual]

Read More
CISO Forum 2026 Mid-Year Review Roundtable

SecurityWeek’s CISO Forum 2026 Mid-Year Review is a virtual roundtable to evaluate the year’s most pressing challenges and share critical updates shaping the 2026 security landscape.
[June 10, 2026 | Virtual]

Read More
Cloud Security Summit 2026

SecurityWeek’s 2026 Cloud Security Summit will help organizations learn how to utilize tools, controls, and design models needed to properly secure cloud environments.
[July 15, 2026 | Virtual]

Read More
CodeSecCon 2026

SecurityWeek’s CodeSecCon 2026 will bring together developers and cybersecurity professionals to revolutionize the way applications are built, secured, and maintained.
[August 19, 2026 | Virtual]

Read More

Vulnerabilities

Cybercrime

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

A long-lived NPM access token was used to bypass the GitHub Actions OIDC-based CI/CD publishing workflow and push backdoored package versions.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.