Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Microsoft security chief Charlie Bell pledges significant reforms and a strategic shift to prioritize security above all other product features.

Israeli startup LayerX Security banks $25 million in new financing as investors continue to pour money into secure web browsing technologies.

The US government warns of a North Korean threat actor abusing weak email DMARC settings to hide spear-phishing attacks.

Noteworthy stories that might have slipped under the radar: 4,000 take part in Locked Shields 2024 exercise, Qantas and JP Morgan hit by data exposure bugs, NVIDIA patches critical flaw. 

A botnet dismantled in January and used by Russia-linked APT28 consisted of more than just Ubiquiti Edge OS routers.

CISA and the FBI warn of threat actors abusing path traversal software vulnerabilities in attacks targeting critical infrastructure.

An analysis of IoCs suggests that a Chinese threat group may be behind the recent ArcaneDoor espionage campaign targeting Cisco firewalls.

SaaS-based, AI-assisted penetration service allows proactive defensive action against exploitation of new vulnerabilities.

Microsoft has uncovered a new type of attack called Dirty Stream that impacted Android apps with billions of installations. 

The White House has published a national security memorandum focusing on critical infrastructure security and resilience.

Yaroslav Vasinskyi was sentenced to 13 years and seven months in prison for his alleged role in the REvil ransomware operation.

People on the Move

Passwordless authentication firm Hawcx has appointed Lakshmi Sharma as Chief Product Officer.

Matt Hartley has been named Chief Revenue Officer at autonomous security solutions provider Horizon3.ai.

Trustwave has announced the appointment of Keith Ibarguen as Senior Vice President of Engineering.

Lital Asher–Dotan has been hired as Chief Marketing Officer at Beyond Identity.

Tidal Cyber announced that Jennifer Leggio has been appointed Chief Operating Officer.

More People On The Move
Microsoft Microsoft

Microsoft security chief Charlie Bell pledges significant reforms and a strategic shift to prioritize security above all other product features.

CVE-2024-21338 zero-day exploited by North Korea CVE-2024-21338 zero-day exploited by North Korea

The US government warns of a North Korean threat actor abusing weak email DMARC settings to hide spear-phishing attacks.

Dropbox data breach Dropbox data breach

Dropbox says hackers breached its Sign production environment and accessed customer email addresses and hashed passwords. 

Top Cybersecurity Headlines

Microsoft security chief Charlie Bell pledges significant reforms and a strategic shift to prioritize security above all other product features.

Israeli startup LayerX Security banks $25 million in new financing as investors continue to pour money into secure web browsing technologies.

The US government warns of a North Korean threat actor abusing weak email DMARC settings to hide spear-phishing attacks.

Noteworthy stories that might have slipped under the radar: 4,000 take part in Locked Shields 2024 exercise, Qantas and JP Morgan hit by data…

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 25-26, Ritz-Carlton, Half Moon Bay, CA]

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Learn More

Designed for senior level cybersecurity leaders to discuss, share and learn innovative information security and risk management strategies, SecurityWeek’s CISO Forum, will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit dives into Threat hunting tools and frameworks, and explores the value of threat intelligence data in the defender’s security stack.

Learn More

Vulnerabilities

Cybercrime

Symantec has pulled back some of the covers from the Proxybox botnet. Symantec researchers revealed that their monitoring of the botnet's command-and-control server during the last few months shows the botnet controller tries to keep the size of the botnet at around 40,000 active users at any given time. The threat is comprised of three components: a dropper, the payload and a rootkit.

Late Sunday, a report surfaced from the US House Intelligence Committee, compiled after nearly a yearlong investigation, that said two Chinese telecom equipment makers "cannot be trusted" to be free of influence from Beijing and could be used to undermine US national security.

Crime may not always pay, but it is always costly. At least that is the case for companies in the U.S., according to a new HP-commissioned report from the Ponemon Institute. In an analysis of attacks impacting 56 sample companies during the first seven months of the year, researchers discovered the financial impact of cyber attacks has increased nearly 40 percent since 2010.

GENEVA - The United States will oppose any major revision to 24-year-old global telecommunications regulations at an international conference in December, the head of the US delegation said Monday, insisting the Internet must remain free and open.

New Offerings Help Better Manage and Secure Corporate and Personal Mobile Devices Across The Enterprise Verizon has expanded its portfolio of “Enterprise Mobility as a Service” offerings to provide additional support for managing a wide range of applications, access options and devices, including smartphones, tablets and laptops.

In case you were not aware, October is National Cyber Security Awareness Month, an initiative designed to “engage and educate public and private sector partners through events and initiatives with the goal of raising awareness about cybersecurity.” 

BEIJING - Beijing on Monday urged Washington to "set aside prejudices" after a draft Congressional report said Chinese telecom firms Huawei and ZTE were security threats that should be banned from business in the US.

NullCrew, known for their attack against the University of Cambridge last month, as well as Sony’s mobile division, has now targeted one of the U.K.’s largest mobile operators, leaking email addresses and database schemas.

Michael W. Baxter, 62, a former network engineer for Verizon Wireless, took advantage of flaws in the company’s procurement process to obtain access to millions of dollars in Cisco equipment, which he then sold in order to fund what authorities call a lavish lifestyle.

Committee Says Chinese Telcoms Failed to Provide Adequate Answers On Relationship With Chinese GovernmentWASHINGTON - Chinese telecom giants Huawei and ZTE pose a security threat to the United States and should be barred from US contracts and acquisitions, a yearlong congressional investigation has concluded.

New details have emerged about the attack toolkit that was used to launch the distributed denial of service (DDoS) attacks against a number of US-based financial institutions late last month.The majority of the banking attack traffic does not appear to have been generated by client bots, but rather from compromised servers in data centers, Carl Herberger, vice-president of security solutions at Radware, told SecurityWeek on Thursday.

During a Wave of Trojan Attacks, a Virtual-machine-synching Module Would "Duplicate" Victim PCs and Use a Genuine IP Address When Compromising Accounts...A gang of cyber thugs has threatened to launch a series of Trojan attacks against at least 30 U.S. banks, according to RSA. Word of what the security firm is saying could be a "blitzkrieg-like" series of attacks was published by the RSA FraudAction Research Labs on Thursday.

MANILA - Philippine President Benigno Aquino defended a new cybercrime law Friday amid a storm of protests from critics who say it will severely curb Internet freedoms and intimidate netizens into self-censorship.

BeyondTrust has released a new version of its free “Community Edition” Retina vulnerability assessment tool. With Retina Community, enterprises can perform on-the-fly assessments without waiting for the next audit, the company said.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Adobe is providing incentives for bug bounty hackers to report security flaws in its implementation of Content Credentials and Adobe Firefly.

Cloud Security

CISO Strategy

Microsoft security chief Charlie Bell pledges significant reforms and a strategic shift to prioritize security above all other product features.