Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Cupertino’s security response team said the flaw was used in “an extremely sophisticated attack against specific targeted individuals.” 

French organizers said “the summit aims at promoting an ambitious French and European AI strategy” as advances in the sector have been led by the U.S. and China.

A critical vulnerability found in Orthanc servers can pose a serious risk to medical data and healthcare operations.

Microsoft has added more Copilot consumer products to its bug bounty program and is offering higher rewards for medium-severity vulnerabilities.

HPE is notifying an unknown number of individuals that Russian hackers accessed their personal information in a December 2023 attack.

Evan Light was sentenced to 20 years in federal prison for hacking an investment holdings company and stealing $37 million in cryptocurrency.

Memorial Hospital and Manor says 120,000 people had their personal information stolen in a November 2024 ransomware attack.

News analysis: The big AI platforms are emerging as frontline early warning systems, detecting nation-state hackers at the outset of their campaigns. Can this help save the threat intel industry?

SolarWinds will become a privately held company following its acquisition by Turn/River Capital for $4.4 billion in cash. 

ThreatMate has raised $3.2 million in seed funding for its AI-powered attack surface management solution for MSPs.

Noteworthy stories that might have slipped under the radar: NanoLock Security ceases operations, NSO publishes transparency report, cybersecurity salaries data.  

People on the Move

Dan Pagel has been named the new CEO of risk management and remediation firm Brinqa.

The City of Phoenix has promoted Mitch Kohlbecker to the role of Chief Information Security Officer.

Gigamon has promoted Tony Jarjoura to CFO and Ram Bhide has been hired as Senior VP of engineering.

Cloud security firm Mitiga has appointed Charlie Thomas as Chief Executive Officer.

Cynet announced the appointment of Jason Magee as Chief Executive Officer.

More People On The Move
iPhone security iPhone security

Cupertino’s security response team said the flaw was used in “an extremely sophisticated attack against specific targeted individuals.” 

Threat Intelligence Report Threat Intelligence Report

News analysis: The big AI platforms are emerging as frontline early warning systems, detecting nation-state hackers at the outset of their campaigns. Can this help save the threat intel industry?

Turn/River Capital acquires SolarWinds Turn/River Capital acquires SolarWinds

SolarWinds will become a privately held company following its acquisition by Turn/River Capital for $4.4 billion in cash. 

Top Cybersecurity Headlines

Hospital Sisters Health System says the personal information of 883,000 individuals was compromised in a 2023 crippling cyberattack.

A bipartisan duo in the the U.S. House is proposing legislation to ban the Chinese artificial intelligence app DeepSeek from federal devices.

Spanish authorities have arrested an individual who allegedly hacked several high-profile organizations, including NATO and the US army.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Examine the state of cybersecurity in the context of quantum computing and artificial intelligence. Discuss the implications of the new White House administration’s cybersecurity policies and how they will influence the industry’s direction in 2025 and beyond.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Watch Now

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 2025, Stay Tuned]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.(February 26, 2025)

Learn More

Supply Chain Security Summit
Join us as we explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects. (March 19, 2025)

Learn More

Vulnerabilities

Cybercrime

WASHINGTON - US President Barack Obama met with leaders of IT and telecoms giants, including Apple, Google and AT&T, to discuss controversial electronic surveillance programs, Politico reported Friday.

Silent Circle, a startup providing private encrypted communications solutions, has shut down an encrypted email service that it offered as part of its secure communications offerings.

Proofpoint, a Sunnyvale, California-based provider of cloud-based security and compliance solutions, announced that it has agreed to acquire Armorize Technologies, a maker of cloud-based anti-malware products for roughly $25 million in cash.

Security software maker ESET this week launched the latest version of its mobile security solution for Android. Completely rebuilt and redesigned, the new ESET Mobile Security for Android brings improved scanning, an anti-phishing module and a redesigned user interface, the company said.

Modern networks have expanded. Their components constantly evolve and spawn new attack vectors including endpoints, mobile devices, web-enabled and mobile applications, virtual infrastructure, data centers, social media, web browsers and home computers. These networks are complex to deploy, manage and secure. Any gap in protection across this extended network can have a ‘ripple effect’ across your entire IT environment, exposing your organization to greater security risk.

In a much-anticipated move, FireEye has filed an S-1 registration statement with the Securities and Exchange Commission (SEC) for a proposed initial public offering (IPO) of its common stock.

MOSCOW - The last Soviet leader Mikhail Gorbachev was forced to deny rumors of his death after hackers planted a false report on Twitter accounts of a state news agency. "I'm alive and well," Gorbachev late Wednesday told the website of Novaya Gazeta newspaper, using a blanked-out Russian expletive to describe his ill-wishers who he said were "hoping in vain".

SAN FRANCISCO - Nintendo said Wednesday that it has filed a lawsuit against a US website with a business model built on hacking into the company's videogame hardware. Nintendo is suing HackYourConsole.com in federal court in the operation's home state of Florida.

Researchers from RSA have uncovered a new banking Trojan designed to steal information from machines running the Linux operating system.  Dubbed “Hand of Thief”, the Trojan is reportedly being sold in closed cybercrime communities for $2,000 with free updates.

Most large organizations are not quite ready to accept the security implications of renting unknown machines from public cloud providers, but transforming data centers to private clouds is in full speed and showing no sign of slowing down. While private clouds are under the control of the corporate IT department, it does not mean that migrating a data center to a private cloud is free of security implications.

BeyondTrust has released a free tool designed to give organizations the ability to track and understand configuration changes and administrative activities for security and compliance reporting for Google Apps.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Cloud Security

Application Security

APIs are easy to develop, simple to implement, and frequently attacked. They are  prime and lucrative targets for cybercriminals. 

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.