Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Join the webinar to learn about active threats targeting common cloud deployments and what security teams can do to mitigate them.

Use of AI to cut through the noise and confusion of the current vulnerability prioritization approaches suggests an exciting future for AI-assisted operations to vulnerability triaging.

High-severity vulnerability in Apple Shortcuts could lead to sensitive information leak without user’s knowledge.

Noteworthy stories that might have slipped under the radar: Spyware vendor Variston is reportedly shutting down, Crowdstrike tracks 232 threat actors, Meta and Freenom reach settlement. 

ConnectWise ScreenConnect vulnerability tracked as CVE-2024-1709 and SlashAndGrab exploited to deliver ransomware and other malware.

Tangerine Telecom says attackers stole the personal information of 230,000 individuals from a legacy customer database.

AT&T said the hourslong outage to its U.S. cellphone network Thursday appeared to be the result of a technical error, not a malicious attack.

Microsoft releases PyRIT red teaming tool to help identify risks in generative AI through automation.

European security vendor Avast is charged with harvesting consumer web browsing data through its browser extension and anti-virus software and “and sold it without adequate notice and without consumer consent.”

Eye care practice management firm American Vision Partners faces lawsuit over data breach impacting 2.3 million patients.

Russian state-sponsored threat actor Turla has been using a new backdoor in recent attacks targeting Polish NGOs.

Threat actors are actively deploying the recently released self-replicating and self-propagating SSH-Snake worm.

Leaked documents show how Chinese authorities surveil dissidents overseas, hack other nations and promote pro-Beijing narratives online.

CISA, FBI and EPA release guidance on how Water and Wastewater Systems Sector entities can secure their environments.

Change Healthcare is experiencing network disruptions after taking systems offline in response to a cyberattack.

ConnectWise vulnerability exploited ConnectWise vulnerability exploited

ConnectWise ScreenConnect vulnerability tracked as CVE-2024-1709 and SlashAndGrab exploited to deliver ransomware and other malware.

Lockbit ransomware takedown Lockbit ransomware takedown

The US is offering big rewards for information on LockBit cybercriminals as law enforcement claims to have identified some individuals.

Apple PQ3 quantum encryption for iMessage Apple PQ3 quantum encryption for iMessage

Apple unveils PQ3, a new post-quantum cryptographic protocol for iMessage designed to protect communications against quantum computing attacks.

Top Cybersecurity Headlines

Join the webinar to learn about active threats targeting common cloud deployments and what security teams can do to mitigate them.

Use of AI to cut through the noise and confusion of the current vulnerability prioritization approaches suggests an exciting future for AI-assisted operations to…

High-severity vulnerability in Apple Shortcuts could lead to sensitive information leak without user’s knowledge.

Noteworthy stories that might have slipped under the radar: Spyware vendor Variston is reportedly shutting down, Crowdstrike tracks 232 threat actors, Meta and Freenom…

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Gain valuable insights from industry professionals who will help guide you through the intricacies of industrial cybersecurity.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Upcoming Virtual Events

CISOs and risk management leaders must understand clearly the role of cyber insurance in a robust security program, ongoing changes to premiums and policy pricing, the errors that could deny coverage and how it all fits into global incident response planning.

Learn More
Cyber AI & Automation Summit

SecurityWeek’s inaugural Cyber AI & Automation Summit pushes the boundaries of security discussions by exploring the implications and applications of predictive AI, machine learning, and automation in modern cybersecurity programs.

Learn More

Designed for senior level cybersecurity leaders to discuss, share and learn innovative information security and risk management strategies, SecurityWeek’s CISO Forum, will take place in 2023 as a virtual event. (June 13-14, 2023)

Learn More

As CISOs and corporate defenders grapple with the intricacies of securing sensitive data passing through multi-cloud deployments and APIs, the importance of frameworks, tools, controls and design models have surfaced to the front burner. (July 19, 2023)

Learn More

Vulnerabilities

Cybercrime

According to a recent study coming from Sophos, the idea of perimeter security translating into network security is dead. The research conducted by Vanson Bourne on behalf of Sophos shows that the SMBs are struggling to keep their infrastructure up to date with current working practices, and its feared that this disconnect will equate to larger security risks.  

Shortly after the public learned that some 6.5 million LinkedIn passwords were compromised, the media focused on two stories; one being the breach itself and the aftermath, the other being the various scams targeting LinkedIn users themselves. As it turns out, the second LinkedIn angle created an unintended consequence.

Microsoft patched more than two dozen security vulnerabilities across several of its products and rolled out a new update feature in response to the Flame attacks in a busy Patch Tuesday. This month's security update featured seven bulletins, including three that are rated 'Critical' and touch issues related to Internet Explorer, the .NET Framework and the Remote Desktop Protocol (RDP). The other four bulletins are rated 'important.'

A court in the U.K. sentenced six men for their roles in managing online forums that coached identity thieves in how to commit fraud. The men were: Jason Place, 42, of Gravesend, Kent; Mark Powell-Richards, 59, Bickley, Kent; Allen Stringer, 57, Crossgates, Leeds; Michael Daly, 68, Erith, Kent; Jaipal Singh, 31, Wednesbury, West Midlands and Arun Thear, 22, West Bromwich, West Midlands. Each received various sentences, with Place garnering the stiffest – six years and nine months.

Despite the increased deployment of DNS Security Extensions (DNSSEC), the global threats from phishing have continued to keep security professionals on their guard. The semi-annual “Global Phishing Survey” from the Anti-Phishing Working Group (APWG) provides powerful insight into what is happening in phishing worldwide.

Dell SecureWorks, the managed security services division of Dell, on Monday launched new managed security services for enterprises, including new managed third-party Security Information and Event Monitoring (SIEM) services and managed services for F5’ BIG-IP Application Security Manager (ASM) Web Application Firewall.

South Korean police arrested a man from Seoul last week in connection with a plot to use infected video games to launch cyber attacks on behalf of North Korea. According to Korea JoongAng Daily, police arrested the 39-year-old video game distributor, identified only by the surname Jo, was caught attempting to launch distributed denial-of-service (DDoS) attacks on Incheon International Airport.

WhiteHat Security, a Santa Clara, California based company best known for its Web application security testing solutions, today launched “Sentinel Source”, a new Static Application Security Testing (SAST) solution that helps developers and security teams with continuous concurrent code assessments.

Researchers are warning organizations that a recently-fixed authentication vulnerability in MySQL is simple to exploit.The authentication bypass, called "tragically comedic" by Rapid7's HD Moore, also affects MariaDB and was fixed in recent versions of both products.

Just one business day after announcing that it has filed an S-1 registration for its Initial Public Offering (IPO), Redwood City, California-based Qualys today introduced a private cloud version of its QualysGuard Cloud Platform that allows customers and partners to host and operate the security and compliance platform within their data centers.

Following the initial discovery of the Flame malware, researchers originally believed there was no significant similarity between its code and development methods and those of the Tilded platform, the development platform that Stuxnet and Duqu are based on.

McAfee today announced new enhancements to its Cloud Security Platform that bring enhanced security for cloud-based interactions through better product integration, context-based policy support and web protection for mobile workers.The McAfee Cloud Security Platform is designed to help organizations extend their security and policy enforcement into the Cloud by securing the three primary channels of traffic – email, web and identity.

After MyBios (Mebromi) became the first malware to successfully infect the Award BIOS and survive a reboot to own the system, BIOS-based rootkits became the toast of the malware research community. That was in 2011, and now, months after the initial discovery, McAfee has found another BIOS-based rootkit – BIOSkit.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Only 54% of major code changes go through a full security review, a new CrowdStrike State of Application Security report reveals.