Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

The flaws allow threat actors to obtain root privileges or bypass authentication via Telnet and gain shell access as root.

The vulnerability is tracked as CVE-2026-21509 and it can be exploited to bypass security features. 

More than 20 vulnerabilities were found and patched in Dormakaba physical access control systems.

The CNAPP company will use the fresh investment to scale its runtime-first cloud security offering across data, AI and code.

Crunchbase was targeted alongside SoundCloud and Betterment in a ShinyHunters campaign.

Understanding how threat hunting differs from reactive security provides a deeper understanding of the role, while hinting at how it will evolve in the future.

Priced $2,000 – $6,000 on a cybercrime forum, the MaaS toolkit promises publication on the Chrome Web Store.

TikTok has finalized a deal to create a new American entity, avoiding the looming threat of a ban in the United States.

10 years after disrupting the Ukrainian power grid, the APT targeted Poland with data-wiping malware.

The critical-severity vulnerability can be exploited via crafted network packets for remote code execution.

The WorldLeaks cybercrime group claims to have stolen information from the footwear and apparel giant’s systems.

Similar to recent FortiCloud single sign-on (SSO) login vulnerabilities, the attacks bypass authentication.

Other noteworthy stories that might have slipped under the radar: Cloudflare WAF bypass, Canonical Snap Store abused for malware delivery, Curl terminating bug bounty program

Door access control vulnerabilities Door access control vulnerabilities

More than 20 vulnerabilities were found and patched in Dormakaba physical access control systems.

Sandworm APT44 Sandworm APT44

10 years after disrupting the Ukrainian power grid, the APT targeted Poland with data-wiping malware.

VMware VMware

The critical-severity vulnerability can be exploited via crafted network packets for remote code execution.

Top Cybersecurity Headlines

The WorldLeaks cybercrime group claims to have stolen information from the footwear and apparel giant’s systems.

Cyber regulations are where politics meets business – where business becomes subject to political realities.

Pwn2Own participants disclosed a total of 76 vulnerabilities during the three-day event. 

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Attendees will walk away with guidance for how to build AI agents identities, unify them under a consistent security model, and ensure AI development moves quickly without compromise.

Register

SecurityWeek’s 2026 Ransomware Summit will discuss a roadmap for defending the enterprise, from mitigating root causes to mastering recovery, giving security teams the critical insights needed to navigate and neutralize today’s ransomware extortion threats.

Register

Upcoming Cybersecurity Events

CISO Forum 2026 Outlook Series

SecurityWeek’s CISO Forum 2026 Outlook Series is a two-part webinar series to evaluate the year’s most pressing challenges and share critical updates shaping the 2026 security landscape.
[January 14 & 21, 2026 | Virtual]

Read More
2026 Ransomware Resilience & Recovery Summit

SecurityWeek’s 2026 Ransomware Summit is a must-attend event for cybersecurity professionals as ransomware attacks continue to hit big-name victims across industries with ruthless efficiency.
[February 25, 2026 | Virtual]

Read More
Supply Chain Security Summit 2026

SecurityWeek’s 2026 Supply Chain Security Summit is where top security experts unpack the complexity of modern software supply chain threats and proven strategies to mitigate risk.
[March 18, 2026 | Virtual]

Read More
TDIR 2026 Summit

SecurityWeek’s 2026 Threat Detection & IR Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and more.
[May 20, 2026 | Virtual]

Read More

Vulnerabilities

Cybercrime

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Cloud Security

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.