Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Cisco Duo warns that breach exposed phone numbers, phone carriers, metadata and other logs that could lead to downstream social engineering attacks.

NightVision, an early stage startup in the application security testing space, has raised $5.4 million in seed funding.

The Dark Angels (Dunghill) ransomware group claims to have stolen 1 Tb of data from Nexperia, which is investigating the incident.

Juniper Networks patches dozens of vulnerabilities in Junos OS, Junos OS Evolved, and other products.

ICS malware Fuxnet allegedly used by Ukrainian Blackjack group to disrupt industrial sensors and other systems belonging to a Moscow infrastructure firm.

Authorities in Australia and the US have arrested and charged two individuals for developing and selling the Hive RAT.

Former security engineer Shakeeb Ahmed was sentenced to prison for hacking and defrauding cryptocurrency exchanges.

Palo Alto Networks has started releasing hotfixes for the firewall zero-day CVE-2024-3400, which some have linked to North Korea’s Lazarus. 

The bill was approved on a bipartisan basis, 273-147, though it will still have to clear the Senate to become law.

A state-sponsored threat actor has been exploiting a zero-day in Palo Alto Networks firewalls for the past two weeks.

Financial terms of the translation were not disclosed but reports out of Tel Aviv valued the deal in the range of $350 million.

People on the Move

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

Former DoD CISO Jack Wilmer has been named CEO of defensive and offensive cyber solutions provider SIXGEN.

Certificate lifecycle management firm Sectigo has hired Jason Scott as its CISO.

The State of Vermont has appointed John Toney as the state’s new CISO.

More People On The Move
Palo Alto Networks Palo Alto Networks

Palo Alto Networks has started releasing hotfixes for the firewall zero-day CVE-2024-3400, which some have linked to North Korea’s Lazarus. 

Microsoft breach Microsoft breach

The US government says Midnight Blizzard’s compromise of Microsoft corporate email accounts “presents a grave and unacceptable risk to federal agencies.”

How AWS disrupts DDoS attacks and is tackling IP Spoofing at the source How AWS disrupts DDoS attacks and is tackling IP Spoofing at the source

SecurityWeek speaks to Tom Scholl, VP and distinguished engineer at AWS, on how the organization tackles IP Spoofing and DDoS attacks.

Top Cybersecurity Headlines

Cisco Duo warns that breach exposed phone numbers, phone carriers, metadata and other logs that could lead to downstream social engineering attacks.

NightVision, an early stage startup in the application security testing space, has raised $5.4 million in seed funding.

The Dark Angels (Dunghill) ransomware group claims to have stolen 1 Tb of data from Nexperia, which is investigating the incident.

Juniper Networks patches dozens of vulnerabilities in Junos OS, Junos OS Evolved, and other products.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 25-26, Ritz-Carlton, Half Moon Bay, CA]

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Learn More

Designed for senior level cybersecurity leaders to discuss, share and learn innovative information security and risk management strategies, SecurityWeek’s CISO Forum, will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit dives into Threat hunting tools and frameworks, and explores the value of threat intelligence data in the defender’s security stack.

Learn More

Vulnerabilities

Cybercrime

The HoneyNet Project has released a new version of the Glastopf Web application honeypot software, which can now replicate SQL Injection attacks. The additional function was created as part of a research program funded by DARPA called Cyber Fast Track.

According to the latest figures from Cloudmark, a firm that specializes in messaging security, there has been a massive uptick in the volume of SMS Phishing attacks this month. Since September 4, Cloudmark says that there has been an increase of more than 900-percent in the overall total of attacks normally observed on a month-to-month basis.

The anti-Virus firm that discovered the Flashback Trojan, Dr. Web, has discovered another family of Mac-based malware that targets passwords. In addition to Mac OS X, this malware also targets Linux installations.

Mobile security vendor Lookout, in their latest State of Mobile Security Report, said that mobile malware is a sustainable profit center for criminals. After that, the report highlights the point that privacy on mobile devices is on of the biggest issues of the year.

Over the summer, Microsoft’s stance on Do Not Track (DNT), specifically the point that they will enable it by default on Internet Explorer 10, has gotten a mix of praise and some serious heat. However, a recent change to Apache’s (HTTPD) source code on GitHub targets Microsoft directly, and if enabled would undermine IE 10’s implementation of DNT.

WASHINGTON, Sept 10, 2012 (AFP) - A member of a hacker collective claimed credit Monday for downing the Web hosting firm GoDaddy, which manages millions of websites around the world. Credit was claimed on Twitter by AnonymousOwn3r, identified as the "security leader" of the loosely organized hacker group knows as Anonymous.

A digital publisher said Monday it was likely the source of a data breach which resulted in the leak of personal data from as many as 12 million Apple iPhone and iPad users. Hackers initially claimed the data containing Apple identification codes known as UDIDs was stolen from an FBI computer, but the US law enforcement agency claimed this was incorrect.

On Sunday, after dealing with an attack on their website earlier in the week, Qatar-based news organization Al Jazeera suffered another attack at the hands of pro-Syrian hackers. The news agency said on Twitter that their SMS news service was compromised, and used to spread propaganda. In a message posted to Twitter on Sunday, Al Jazeera Arabic said that their SMS service was compromised by “pirates” who used the hijacked access to “send fake news with no basis.”

Tenable Network Security, makers of vulnerability scanners and software solutions that helps find network security gaps, this week announced that it has raised $50 million in its first-round funding from Accel Partners. The company said it would use the cash boost to expand its security offerings and accelerate global growth, as well as deepening its research into threats.

Back in early 2010, Google announced it had been a victim of a persistent and sophisticated attack conducted over a sustained period of time. According to Google, the attackers behind "Operation Aurora" were from China and had the backing of the Chinese government.

Google Broadens Its Security Insight With Acquisition of VirusTotalGoogle has acquired VirusTotal, the popular service that lets users analyze suspicious files and URLs to help facilitate the detection of malware.

Last month, an (electronic) age old debate was rekindled by an article penned by Dave Aitel titled “Why you shouldn't train employees for security awareness”. His basic argument is that the money and time invested in Security Awareness Training is better spent elsewhere to better effect.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Cloud Security

Cloud Security

Financial terms of the translation were not disclosed but reports out of Tel Aviv valued the deal in the range of $350 million.