Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Cisco warns that nation state-backed hackers are exploiting at least two zero-day vulnerabilities in its ASA firewall platforms to plant malware on telecommunications and energy sector networks.

KnowBe4 boasts that the merger will create “the largest, advanced AI-driven cybersecurity platform for managing human risk.”

As a security industry, we need to focus our energies on those professionals among us who know how to walk the walk.

A North Korea-linked threat actor hijacked the update mechanism of eScan antivirus to deploy backdoors and cryptocurrency miners.

Irish startup Tines raises $50 million in new venture capital funding as investors make big bets on automation and orchestration startups.

Google patches CVE-2024-4058, a critical Chrome vulnerability for which researchers earned a $16,000 reward. 

Amplifier Security has raised $3.3 million in funding for a solution that includes human-in-the-loop automation and an AI copilot.

Nagomi Security, a company that helps customers prevent threats by leveraging existing security tools, emerged from stealth with $30 million in funding. 

CISA warns organizations of a two-year-old Windows Print Spooler vulnerability being exploited in the wild.

A threat actor tracked as CoralRaider has been using multiple infostealers to harvest credentials from users worldwide.

SD-WAN must be scalable, stable, secure, and fully operational to serve as a strong base for seamless modernization and progression to SASE. 

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

UK cybersecurity agency NCSC announced Richard Horne as its new CEO.

More People On The Move
CISA Warns of Windows Print Spooler Flaw After Microsoft Sees Russian Exploitation

CISA warns organizations of a two-year-old Windows Print Spooler vulnerability being exploited in the wild.

Threat Intelligence Report Threat Intelligence Report

Mandiant’s M-Trends 2024 report shows that defenses are improving – and that may be true. But the reality remains that these same statistics demonstrate that if anything, the attackers still retain the upper hand.

Streaming services hack Streaming services hack

Microsoft PlayReady vulnerabilities that could allow rogue subscribers to illegally download movies from popular streaming services.

Top Cybersecurity Headlines

Cisco warns that nation state-backed hackers are exploiting at least two zero-day vulnerabilities in its ASA firewall platforms to plant malware on telecommunications and…

KnowBe4 boasts that the merger will create “the largest, advanced AI-driven cybersecurity platform for managing human risk.”

As a security industry, we need to focus our energies on those professionals among us who know how to walk the walk.

A North Korea-linked threat actor hijacked the update mechanism of eScan antivirus to deploy backdoors and cryptocurrency miners.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 25-26, Ritz-Carlton, Half Moon Bay, CA]

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Learn More

Designed for senior level cybersecurity leaders to discuss, share and learn innovative information security and risk management strategies, SecurityWeek’s CISO Forum, will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit dives into Threat hunting tools and frameworks, and explores the value of threat intelligence data in the defender’s security stack.

Learn More

Vulnerabilities

Cybercrime

Mobile security vendor Lookout, in their latest State of Mobile Security Report, said that mobile malware is a sustainable profit center for criminals. After that, the report highlights the point that privacy on mobile devices is on of the biggest issues of the year.

Over the summer, Microsoft’s stance on Do Not Track (DNT), specifically the point that they will enable it by default on Internet Explorer 10, has gotten a mix of praise and some serious heat. However, a recent change to Apache’s (HTTPD) source code on GitHub targets Microsoft directly, and if enabled would undermine IE 10’s implementation of DNT.

WASHINGTON, Sept 10, 2012 (AFP) - A member of a hacker collective claimed credit Monday for downing the Web hosting firm GoDaddy, which manages millions of websites around the world. Credit was claimed on Twitter by AnonymousOwn3r, identified as the "security leader" of the loosely organized hacker group knows as Anonymous.

A digital publisher said Monday it was likely the source of a data breach which resulted in the leak of personal data from as many as 12 million Apple iPhone and iPad users. Hackers initially claimed the data containing Apple identification codes known as UDIDs was stolen from an FBI computer, but the US law enforcement agency claimed this was incorrect.

On Sunday, after dealing with an attack on their website earlier in the week, Qatar-based news organization Al Jazeera suffered another attack at the hands of pro-Syrian hackers. The news agency said on Twitter that their SMS news service was compromised, and used to spread propaganda. In a message posted to Twitter on Sunday, Al Jazeera Arabic said that their SMS service was compromised by “pirates” who used the hijacked access to “send fake news with no basis.”

Tenable Network Security, makers of vulnerability scanners and software solutions that helps find network security gaps, this week announced that it has raised $50 million in its first-round funding from Accel Partners. The company said it would use the cash boost to expand its security offerings and accelerate global growth, as well as deepening its research into threats.

Back in early 2010, Google announced it had been a victim of a persistent and sophisticated attack conducted over a sustained period of time. According to Google, the attackers behind "Operation Aurora" were from China and had the backing of the Chinese government.

Google Broadens Its Security Insight With Acquisition of VirusTotalGoogle has acquired VirusTotal, the popular service that lets users analyze suspicious files and URLs to help facilitate the detection of malware.

Last month, an (electronic) age old debate was rekindled by an article penned by Dave Aitel titled “Why you shouldn't train employees for security awareness”. His basic argument is that the money and time invested in Security Awareness Training is better spent elsewhere to better effect.

Reuters is reporting that sources close to the investigation efforts in the Aramco attack are reporting that insiders are partly responsible. In August, Aramco, Saudi Arabia’s national oil company – and the world’s largest oil producer – had to contend with a malware outbreak that hit 30,000 systems in a single go.

On Thursday, Joshua Schichtel was sentenced to 30 months in prison, and ordered to three years of supervised release. The sentence comes after he pled guilty to selling access to botnets last August. Schichtel, 30, of Phoenix, Arizona, pled guilty to one count of attempting to cause damage to multiple computers without authorization by the transmission of programs, codes or commands. 

Analyzing data collected and categorized by the Privacy Rights Clearinghouse, researchers at Rapid7 crunched the numbers and determined that over the last three years, more than 94 million records containing personally identifiable information (PII) were exposed due to data breaches in the government sector.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Cloud Security

Artificial Intelligence

Cisco announces Hypershield, an AI-native and cloud-native enterprise security solution with a wide range of capabilities.