Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Google says the hacking group behind the recent cyberattacks on UK retailers is now shifting focus to the US.

A summary of noteworthy stories that might have slipped under the radar this week.

The 15th edition of NATO’s Locked Shields cyber defense exercise brought together 4,000 experts from 41 countries.

Russia-linked APT28 has been exploiting mail server vulnerabilities against government and defense entities since September 2023.

The FBI says former federal and state government officials are targeted with texts and AI-generated voice messages impersonating senior US officials.

Pwn2Own participants have earned tens of thousands of dollars for Red Hat, Windows, Oracle VirtualBox, Docker Desktop, and AI exploits.

Once a key figure in the Angler exploit kit underworld, Tarasov’s life has unraveled into detention, paranoia, and an unwanted return to the Russia he publicly despised.

Coinbase said a group of rogue contractors were bribed to pull customer data from internal systems, leading to a $20 million ransom demand.

American steel giant Nucor on Wednesday disclosed a cybersecurity incident that bears the hallmarks of a ransomware attack.

Enterprise cybersecurity giant Proofpoint is buying Germany-based Microsoft 365 security solutions provider Hornetsecurity.

The China-linked hacking group Earth Ammit has launched multi-wave attacks in Taiwan and South Korea to disrupt the drone sector.

People on the Move

Shane Barney has been appointed CISO of password management and PAM solutions provider Keeper Security.

Edge Delta has appointed Joan Pepin as its Chief Information Security Officer.

Vats Srivatsan has been appointed interim CEO of WatchGuard after Prakash Panjwani stepped down.

Network security policy management firm FireMon has appointed Alex Bender as Chief Marketing Officer.

Jeffrey Engle has been named CEO of CYBERWELL, the cybersecurity division of WELL Health Technologies.

More People On The Move
NATO Locked Shields NATO Locked Shields

The 15th edition of NATO’s Locked Shields cyber defense exercise brought together 4,000 experts from 41 countries.

Pwn2Own Berlin 2025 Pwn2Own Berlin 2025

Pwn2Own participants have earned tens of thousands of dollars for Red Hat, Windows, Oracle VirtualBox, Docker Desktop, and AI exploits.

Nucor Cyberattack Nucor Cyberattack

American steel giant Nucor on Wednesday disclosed a cybersecurity incident that bears the hallmarks of a ransomware attack.

Top Cybersecurity Headlines

The China-linked hacking group Earth Ammit has launched multi-wave attacks in Taiwan and South Korea to disrupt the drone sector.

Google bundles multiple safeguards under a single Android toggle to protect high-risk users from advanced mobile malware implants.

Ivanti has released patches for two EPMM vulnerabilities that have been chained in the wild for remote code execution.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Join this webinar for a fascinating discussion to understand why data in itself is not enough to make informed decisions for prioritization.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

What is the state of cyber security in critical infrastructure?  Still immature by most standards, but improving steadily thanks to a strong effort from industry.  That was the message received during last week’s ISA Automation Week conference in Nashville, TN. In my

Every organization is a potential target for a cyberattack. The impact can be devastating, from loss of data and customer trust to significant financial losses. In fact, the overall security environment has become so demanding that there has been a growing focus on developing a new breed of security leaders.

SINGAPORE - A rash of website hackings in the Asia-Pacific has exposed weak cyber defenses which must be improved to help the region deal with more sophisticated and sinister threats, particularly from criminal organizations, analysts said.

LONDON - Britain's top spy chiefs warned in an unprecedented television appearance on Thursday that Al-Qaeda and other enemies were "lapping up" intelligence leaks by Edward Snowden and using them to change the way they operate.

WASHINGTON - The CIA pays AT&T more than $10 million a year to provide phone records with possible links to suspected terrorists, the New York Times reported Thursday, citing government officials. The arrangement is voluntary and there is no court order requiring the company to cooperate with the Central Intelligence Agency, officials told the Times.

Public cloud provides a wide spectrum of services, from Infrastructure-as-a-Service (IaaS), Platform (PaaS), through to Software-as-a-Service (SaaS). SaaS is likely the most familiar, since the vast majority of organizations have consumed a SaaS application in one form or another. While traditional hosting services have evolved away from bare metal to form IaaS, and generally up the stack to PaaS, including security as part of the service will change as security gets baked-in closer to the infrastructure.

SYDNEY - An Australian man claimed Friday to be the victim of a massive bitcoin robbery, saying hackers had stolen more than one million dollars of the digital currency from his website.

SAN FRANCISCO - Silk Road, the online black market bazaar for drugs, hacker tools and other illicit goods, says it is back a month after the FBI took down the website.

WASHINGTON- The White House is looking at ending a policy that gives a single military officer authority over the National Security Agency as well as the US cyber warfare command, officials said Thursday.

It's official – PCI 3.0, the latest version of the PCI Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS) have now been published. Fortunately for businesses however, they have more than a year before they have to fully make the transition.

SINGAPORE - Singapore Prime Minister Lee Hsien Loong's official website was hacked Thursday by apparent members of activist group Anonymous after he vowed to hunt down anyone who attacks the city-state's technological network.

Microsoft plans to release eight security bulletins this month for Patch Tuesday, including three ranked 'Critical.' The most serious updates affect Internet Explorer and Windows. The remaining five bulletins address issues in both Windows and Microsoft Office.

BRASïLIA - Brazilian judges have given US Internet search giant Google until Saturday to turn over private data collected through its Street View program, press reports said Thursday. Failure to do so would mean a daily fine of $50,000, up to a maximum of $500,000.

Hardware-accelerated DDoS Protection Safeguards Applications and Networks F5 Networks this week announced what the company says it its most comprehensive on-premises DDoS protection solution available in a single product.

Evolve or adapt? For enterprises today confronted by increasingly intricate – and damaging – cyber threats, there may no longer be a viable choice: We must carefully phase out the evolutionary-rooted security tactics which organizations have depended upon for decades.Such a move would pave the way for adaption.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Code quality and security firm CodeAnt has secured $2 million in seed funding and it has been valued at $20 million.

Cloud Security

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.