Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

The critical-severity flaw allows attackers to smuggle HTTP requests and access sensitive data, modify server files, or cause DoS conditions.

SimSpace provides realistic cyber ranges where organizations can test attack preparedness and validate defenses.

A new class of Mirai-based DDoS botnets have been launching massive attacks, but their inability to spoof traffic enables device remediation.

Sublime Security’s Series C funding round brings the total raised by the company to more than $240 million.

Data allegedly stolen from the companies has been made available for download on the Cl0p ransomware leak website.

The email addresses were pulled from various sources and 16.4 million of them were not present in previous data breaches.

The hackers stole information from a file transfer solution and the country’s power supply was not affected.

Chainguard has raised $636 million in the past six months alone for its software supply chain security solutions. 

The malicious Smishing Triad domains were used to collect sensitive information, including Social Security numbers.

All new extensions will be required to declare their data collection practices in their manifest file using a specific key.

Roughly 9 million exploit attempts were observed this month as mass exploitation of the critical vulnerabilities recommenced.

Coveware has attributed the drop to large enterprises increasingly refusing to pay up and smaller amounts paid by mid-market firms.

Schneider Electric and Emerson targeted in Oracle hack Schneider Electric and Emerson targeted in Oracle hack

Data allegedly stolen from the companies has been made available for download on the Cl0p ransomware leak website.

Sweden electric grid operator hacked Sweden electric grid operator hacked

The hackers stole information from a file transfer solution and the country’s power supply was not affected.

Chrome vulnerability Chrome vulnerability

The threat actor behind Operation ForumTroll used the same toolset typically employed in Dante spyware attacks.

Top Cybersecurity Headlines

WhatsApp told SecurityWeek that the two low-impact vulnerabilities cannot be used for arbitrary code execution. 

CVE-2025-59287 allows a remote, unauthenticated attacker to execute arbitrary code and a PoC exploit is available.

The customer information published on the dark web includes names, addresses, phone numbers, and email addresses.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Dr. Torsten George, a renowned cybersecurity expert, will dissect the Scattered Spider playbook to highlight key lessons organizations can apply to stay ahead of these persistent and evolving threats.

Register

Designed for senior level cybersecurity leaders to discuss, share and learn innovative cybersecurity and risk management strategies.

Register

This session will explore the critical steps industrial organizations must take to effectively protect operations, achieve compliance, and ensure both operational continuity and long-term growth.

Register

Upcoming Cybersecurity Events

The Industrial Control Systems (ICS) Cybersecurity Conference is the largest and longest-running event series focused on industrial cybersecurity.
[October 27-30, 2025 | Atlanta]

Learn More

SecurityWeek’s 2025 CISO Forum Virtual Summit Designed for senior level cybersecurity leaders to discuss, share and learn innovative cybersecurity and risk management strategies.
[November 12, 2025 – Virtual]

Read More

SecurityWeek’s Cyber AI & Automation Summit pushes the boundaries of security discussions by exploring the implications and applications of predictive AI, machine learning, and automation in modern cybersecurity programs.
[December 10, 2025 | Virtual]

Read More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Cloud Security

Cloud Security

A vulnerability in RMP initialization allows the AMD processor’s x86 cores to maliciously control parts of the initial RMP state.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.