Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Join this one-day virtual summit as we shine the spotlight on the shadowy dynamics of ransomware attacks and how you can best prepare your organization to defend against and recover from these relentless attacks.

PuTTY vulnerability CVE-2024-31497 allows attackers to compromise private keys and use them to forge signatures. 

Charles O. Parks III was arrested and charged with defrauding two cloud-services providers of $3.5 million.

Cloud security specialists found data exposure risk associated with Azure, AWS, and Google Cloud command-line tools.

Kevin O’Connor knew he was a hacker by the time he was in Middle School. He went on to work for the NSA and is now director of threat research at Adlumin.

The RansomHub group has started leaking information allegedly stolen from Change Healthcare in February 2024.

Foreign attackers have many more toolsets at their disposal, so we need to make sure we’re selective about our modeling, preparation and how we assess and fortify ourselves.

Omni Hotels says customer information was compromised in a cyberattack claimed by the Daixin Team ransomware group.

PAM company Delinea over the weekend rushed to patch a critical authentication bypass vulnerability after it apparently ignored the researcher who found the flaw.

Cisco Duo warns that breach exposed phone numbers, phone carriers, metadata and other logs that could lead to downstream social engineering attacks.

NightVision, an early stage startup in the application security testing space, has raised $5.4 million in seed funding.

People on the Move

Kim Larsen is new Chief Information Security Officer at Keepit

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

Former DoD CISO Jack Wilmer has been named CEO of defensive and offensive cyber solutions provider SIXGEN.

Certificate lifecycle management firm Sectigo has hired Jason Scott as its CISO.

More People On The Move
Delinea vulnerability Delinea vulnerability

PAM company Delinea over the weekend rushed to patch a critical authentication bypass vulnerability after it apparently ignored the researcher who found the flaw.

Palo Alto Networks Palo Alto Networks

Palo Alto Networks has started releasing hotfixes for the firewall zero-day CVE-2024-3400, which some have linked to North Korea’s Lazarus. 

Microsoft breach Microsoft breach

The US government says Midnight Blizzard’s compromise of Microsoft corporate email accounts “presents a grave and unacceptable risk to federal agencies.”

Top Cybersecurity Headlines

Join this one-day virtual summit as we shine the spotlight on the shadowy dynamics of ransomware attacks and how you can best prepare your…

PuTTY vulnerability CVE-2024-31497 allows attackers to compromise private keys and use them to forge signatures. 

Charles O. Parks III was arrested and charged with defrauding two cloud-services providers of $3.5 million.

Cloud security specialists found data exposure risk associated with Azure, AWS, and Google Cloud command-line tools.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 25-26, Ritz-Carlton, Half Moon Bay, CA]

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Learn More

Designed for senior level cybersecurity leaders to discuss, share and learn innovative information security and risk management strategies, SecurityWeek’s CISO Forum, will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit dives into Threat hunting tools and frameworks, and explores the value of threat intelligence data in the defender’s security stack.

Learn More

Vulnerabilities

Cybercrime

Kaspersky Lab, the Moscow-based security and threat management software firm best known for its endpoint anti-virus solutions, on Monday announced that it has plans to develop a software-based solution to secure network traffic as part of the VMware Ready™ for Networking and Security Program.

SafeNet Protect V Delivers Data Control, Visibility and Governance for VMware & AWS Hosted Virtual Machines SafeNet, a Baltimore, Maryland-based provider of network security and data protection solutions, has launched “ProtectV”, a new encryption solution designed to address the security, control, and governance issues associated with data stored in the cloud.

How Can Today’s IT Managers Prepare and Recover From a Certificate Authority Breach?It is no secret that IT security breaches, data theft and attacks on the rise – consequently forcing IT managers to evolve their security foundations and turn to different technologies to protect the intellectual property of the data stores and data transmission systems they are charged with protecting.

Saudi Arabia-based Aramco was attacked earlier this month by malware that targeted some 30,000 workstations. According to the state-owned group which controls all of Saudi Arabia's oil production, things have been cleaned up in short time, and oil production itself was not impacted.

Security researchers from FireEye have discovered a new zero-day Java vulnerability that is being targeted in the wild. According to FireEye researcher Atif Mushtaq, the latest version of Java 7 is vulnerable, but some reports say Java 6 and earlier versions may not be vulnerable.

ROME - (AFP) - Italy's police said Saturday they have seized so far this year 52 million counterfeit items, including train tickets, smartphones, condoms and detergents, with much of them coming from China. The financial police's counter-fraud division said 97 members of organised criminal gangs, 41 percent of them Italian, were arrested during the same first seven months of 2012 in connection with the counterfeit goods.

On Thursday, law enforcement officials with the Criminal Investigation and Detection Group (CIDG) and the Presidential Anti-Organized Crime Commission (PAOCC) in the Philippines arrested more than 300 in a cybercrime sweep. The arrests took place in several subdivisions, and the operation is being hailed as the biggest cybercrime operation in the nation’s history.

Security researchers from Websense have discovered a new malware campaign targeting BlackBerry customers. The malicious emails say that the recipient has successfully created a Blackberry ID, and attempts to infect their system via a malicious attachment. "To enjoy the full benefits of your BlackBerry ID, please follow the instructions in the attached file," the email reads.

DARPA Opens the Door to ‘Plan X’ ProposalsIn June, SecurityWeek reported on a plan from the secretive Defense Advanced Research Projects Agency (DARPA), which will improve the government’s cyberwar capabilities. As expected, DARPA has said they will hold a meeting next month to solicit ideas.

NEW DELHI - (AFP) - India on Friday defended itself against accusations of heavy-handed online censorship, saying it had been successful in blocking content blamed for fuelling ethnic tensions.

SAN FRANCISCO - (AFP) - Microsoft on Thursday unveiled a new corporate logo for the first time in 25 years as the US tech giant geared up for a series of big product launches. It features a symbol made up of four separate colored squares -- reminiscent of the old Windows logo featuring wavy squares -- next to the name of the company. The previous logo was simply the italicized name.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Cloud Security

Cloud Security

Cloud security specialists found data exposure risk associated with Azure, AWS, and Google Cloud command-line tools.