Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

A new Android trojan named Brokewell can steal user’s sensitive information and allows attackers to take over devices.

More than 1,400 CrushFTP servers remain vulnerable to an actively exploited zero-day for which PoC has been published.

More than 90,000 unique IPs are still infected with a PlugX worm variant that spreads via infected flash drives.

Noteworthy stories that might have slipped under the radar: Volkswagen hacked by Chinese threat group, DDoS service shut down, Rubrik IPO.

UK cybersecurity firm Darktace has agreed to sell itself to private equity giant Thoma Bravo for approximately $5.32 million in cash.

A vulnerability in the WordPress Automatic plugin is being exploited to inject backdoors and web shells into websites.

Predictive attack intelligence and risk protection startup BforeAI has raised $15 million in a Series A funding round led by SYN Ventures.

Palo Alto Networks has shared remediation instructions for organizations whose firewalls have been hacked via CVE-2024-3400.

A new phishing campaign abuses compromised email accounts and targets corporate users with PDF files hosted on Autodesk Drive.

The FTC is sending a total of $5.6 million in refunds to over 117,000 Ring customers as result of a 2023 settlement.

The Brocade SANnav management application is affected by multiple vulnerabilities, including a publicly available root password.

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move
Android Malware Android Malware

A new Android trojan named Brokewell can steal user’s sensitive information and allows attackers to take over devices.

Palo Alto Networks Palo Alto Networks

Palo Alto Networks has shared remediation instructions for organizations whose firewalls have been hacked via CVE-2024-3400.

CISA Warns of Windows Print Spooler Flaw After Microsoft Sees Russian Exploitation

CISA warns organizations of a two-year-old Windows Print Spooler vulnerability being exploited in the wild.

Top Cybersecurity Headlines

A new Android trojan named Brokewell can steal user’s sensitive information and allows attackers to take over devices.

More than 1,400 CrushFTP servers remain vulnerable to an actively exploited zero-day for which PoC has been published.

More than 90,000 unique IPs are still infected with a PlugX worm variant that spreads via infected flash drives.

Noteworthy stories that might have slipped under the radar: Volkswagen hacked by Chinese threat group, DDoS service shut down, Rubrik IPO.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 25-26, Ritz-Carlton, Half Moon Bay, CA]

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Learn More

Designed for senior level cybersecurity leaders to discuss, share and learn innovative information security and risk management strategies, SecurityWeek’s CISO Forum, will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit dives into Threat hunting tools and frameworks, and explores the value of threat intelligence data in the defender’s security stack.

Learn More

Vulnerabilities

Cybercrime

Enigma Module Offers Full Disk Encryption for USB Storage DrivesEnova Technology, a Taiwan-based provider of encryption solutions, on Monday launched a USB encryption solution designed to provide consumers and enterprises with real-time full disk encryption for just about any USB mass storage class drive.

In the physical world, some metropolitan areas manage growth by creating boundaries. In the online world, growth is also controlled with boundaries. And right now, we’re in the middle of setting the course for how the real estate of the Internet will be labeled and accessed for years to come with the Internet Corporation for Assigned Names and Numbers (ICANN) new gTLD Program.

McAfee announced on Tuesday that it has been awarded a multi-year Enterprise Level Agreement contract from the Department of Homeland Security (DHS) that could be valued up to $12 million. Under the contract, McAfee says it plans to provide the DHS with a number of of enterprise wide network and system security products, services and support, including expanding the DHS’s continuous monitoring and security capabilities.

WELLINGTON - (AFP) - Megaupload boss Kim Dotcom on Tuesday accused New Zealand police of kicking and punching him when they raided his Auckland mansion earlier this year to arrest him for alleged copyright piracy.Dotcom told the Auckland High Court he tried to surrender peacefully to police during the raid in January, when about 70 armed police cooperating with a major US online piracy probe raided the mansion.

SEOUL- (AFP) - South Korea's Samsung Electronics said Tuesday it had launched a super-size version of its Galaxy Note smartphone, the latest salvo in its battle with Apple for the multi-billion-dollar handheld market.The Galaxy Note 10.1, which went on sale on Monday in Germany and the United Arab Emirates, is almost twice as wide as its predecessor and nearly the size of a tablet.

Ever wonder how some Twitter accounts seemingly became so popular overnight? According to Barracuda Networks, it is not always due to the person's celebrity or charisma, but instead is tied to a thriving black market for phony social networking accounts.

Apple’s tech support department is taking some heat after their actions led to a journalist losing control of all of the data associated with his iCloud account, which in turn led to the compromise of Gizmodo’s Twitter account over the weekend.

On Friday, Reuters reported that its blogging platform was compromised and used to post false news stories. As it turned out, not only was the publishing platform targeted, but Reuters’ Twitter accounts were as well.

Would you, could you, protect my data? Protect it now, protect it then, please protect it everywhen. Protect my health and banking stuff, though it can be, will be rough.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Cloud Security

Artificial Intelligence

Cisco announces Hypershield, an AI-native and cloud-native enterprise security solution with a wide range of capabilities.