Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

The Hellcat ransomware group claims to have stolen tens of gigabytes of data from Ascom and Jaguar Land Rover.

Former NFL and University of Michigan assistant football coach Matt Weiss hacked into the computer accounts of thousands of college athletes seeking intimate photos and videos.

More details have come to light on the recent supply chain attack targeting GitHub Actions, including its root cause.

Analysis reveals a 140% increase in browser phishing, including a 130% increase in zero-hour phishing attacks.

Real-time event and risk detection firm Dataminr has raised $85 million from NightDragon and HSBC to accelerate AI development.

CISA has added an absolute path traversal bug in Nakivo Backup and Replication to its Known Exploited Vulnerabilities list.

A Joni Mitchell song from the 1960s can teach us a lot about securing hybrid and multi-cloud environments.

Veeam has released patches for a critical-severity remote code execution vulnerability in Backup & Replication.

Pennsylvania State Education Association says the personal information of over 500,000 individuals was stolen in a data breach.

SANS is seeing attempts to exploit two critical Cisco Smart Licensing Utility vulnerabilities tracked as CVE-2024-20439 and CVE-2024-20440.

Amazon is ending a little-used privacy feature that let some users of its Echo smart speaker prevent their voice commands from going to the company’s cloud.

People on the Move

Forcepoint has appointed Guy Shamilov as CISO, Bakshi Kohli as CTO and Naveen Palavalli as CPO and CMO.

Paul Calatayud has been named CISO of developer security posture management firm Archipelo.

Cyber readiness and response firm Sygnia has appointed Avi Golan as its new CEO.

Cybersecurity firm Absolute Security announced Harold Rivas as its new CISO.

Simon Forster has been named the new General Manager of DNS security firm Quad9.

More People On The Move
GitHub supply chain attack GitHub supply chain attack

More details have come to light on the recent supply chain attack targeting GitHub Actions, including its root cause.

WhatsApp Exploits WhatsApp Exploits

Attacks involving Paragon’s Graphite spyware involved a WhatsApp zero-day that could be exploited without any user interaction.

Google acquires Wiz Google acquires Wiz

News analysis: Google positions itself to compete with Microsoft for enterprise security dollars. How does this deal affect startup ecosystem?

Top Cybersecurity Headlines

A long-running campaign phishing for credentials through scareware recently switched to targeting macOS users.

Google has confirmed reports that it’s buying cloud security giant Wiz and says it’s prepared to pay $32 billion in cash.

A year-old vulnerability in a third-party ChatGPT tool is being exploited against financial entities and US government organizations.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

This webinar will guide you in aligning your security testing strategy with the right tools, helping you move beyond identifying weaknesses to effectively validating your overall security posture.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

This event delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Learn More

Supply Chain Security Summit
Join us as we explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects. (March 19, 2025)

Learn More

Vulnerabilities

Cybercrime

BRASÍLIA - President Dilma Rousseff on Monday hit out at alleged Canadian spying on Brazil's Mining and Energy Ministry, demanding that the United States and its allies stop such practices.

Britain Launches its Latest Answer to the FBILONDON - Britain's new FBI-style crime-fighting agency was launched Monday with a threat to hit the country's most "horrible" criminals with a robust response.

A popular open-source software for e-commerce is vulnerable to being cheated, computer security researchers at the University of California, Davis, have found. By exploiting vulnerabilities in the widely used osCommerce software, the researchers were able to purchase items from online stores for free or substantially less than their correct prices.

Recent reports in the media are detailing how various government, media and technology companies in Japan and South Korea were victims of a new kind of cyberattack dubbed Icefog. The attacks originated in China and are the work of cybercriminals hired on a project basis, according to Kaspersky Lab.

WASHINGTON - Thirteen alleged members of the loosely organized hacker collective known as Anonymous were indicted Thursday in connection with a series of online attacks on US companies and trade groups.

KARACHI - Pakistan's southern Sindh province will block access to online communication networks including Skype and WhatsApp for three months in a bid to curb terrorism, officials said Thursday. "We regret the inconvenience to the users but we are compelled to ban those networks for three months" in the province, Sindh's Information Minister Sharjeel Memon told AFP.

In the business of domestic and military intelligence the sources and methods for how intelligence is derived are highly protected. This includes the technology and processes used as well as the relationships and intelligence assets leveraged. There is inherent trust between the consumer and authorized agencies and organizations gathering, synthesizing and distributing this intelligence.

One of Washington's Top Concerns is the Threat from Cyber-attacks, Which it Has Said Largely Emanate from ChinaTOKYO - Japanese and US foreign and defense ministers huddled Thursday to renew their security alliance as an emboldened Tokyo looks to push back against regional threats and the growing might of China.

McAfee, in an effort to help companies defend against advanced malware, announced a new appliance-based solution designed to help its customers respond to attacks faster and move from detection and analysis to protection and resolution.

WASHINGTON - A request by major technology firms to disclose more about US intelligence services' data requests would "cause serious harm to national security," the government said in a court filing Wednesday.

HAVANA - Colombia's leftist FARC guerrillas said Wednesday they have been victims of "cyber espionage," and suggested the US National Security Agency may be to blame. Recent revelations by former intelligence contractor Edward Snowden have exposed the NSA's far-reaching electronic surveillance of phone records and Internet traffic.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Google has integrated OSV-SCALIBR features into OSV-Scanner, its free vulnerability scanner for open source developers.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.