Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Israeli startup LayerX Security banks $25 million in new financing as investors continue to pour money into secure web browsing technologies.

The US government warns of a North Korean threat actor abusing weak email DMARC settings to hide spear-phishing attacks.

Noteworthy stories that might have slipped under the radar: 4,000 take part in Locked Shields 2024 exercise, Qantas and JP Morgan hit by data exposure bugs, NVIDIA patches critical flaw. 

A botnet dismantled in January and used by Russia-linked APT28 consisted of more than just Ubiquiti Edge OS routers.

CISA and the FBI warn of threat actors abusing path traversal software vulnerabilities in attacks targeting critical infrastructure.

An analysis of IoCs suggests that a Chinese threat group may be behind the recent ArcaneDoor espionage campaign targeting Cisco firewalls.

SaaS-based, AI-assisted penetration service allows proactive defensive action against exploitation of new vulnerabilities.

Microsoft has uncovered a new type of attack called Dirty Stream that impacted Android apps with billions of installations. 

The White House has published a national security memorandum focusing on critical infrastructure security and resilience.

Yaroslav Vasinskyi was sentenced to 13 years and seven months in prison for his alleged role in the REvil ransomware operation.

A new Silicon Valley startup called Mimic is coming out of the shadows with a hefty $27 million seed-stage funding round led by Ballistic Ventures.

People on the Move

Passwordless authentication firm Hawcx has appointed Lakshmi Sharma as Chief Product Officer.

Matt Hartley has been named Chief Revenue Officer at autonomous security solutions provider Horizon3.ai.

Trustwave has announced the appointment of Keith Ibarguen as Senior Vice President of Engineering.

Lital Asher–Dotan has been hired as Chief Marketing Officer at Beyond Identity.

Tidal Cyber announced that Jennifer Leggio has been appointed Chief Operating Officer.

More People On The Move
Botnet Disrupted by FBI Still Used by Russian Spies, Cybercriminals

A botnet dismantled in January and used by Russia-linked APT28 consisted of more than just Ubiquiti Edge OS routers.

Dropbox data breach Dropbox data breach

Dropbox says hackers breached its Sign production environment and accessed customer email addresses and hashed passwords. 

Interview Geoff Belknap, CISO at LinkedIn, and Guy Rosen, CISO at Facebook parent company Meta. Interview Geoff Belknap, CISO at LinkedIn, and Guy Rosen, CISO at Facebook parent company Meta.

SecurityWeek interviews Geoff Belknap, CISO at LinkedIn, and Guy Rosen, CISO at Facebook parent company Meta.

Top Cybersecurity Headlines

Israeli startup LayerX Security banks $25 million in new financing as investors continue to pour money into secure web browsing technologies.

The US government warns of a North Korean threat actor abusing weak email DMARC settings to hide spear-phishing attacks.

Noteworthy stories that might have slipped under the radar: 4,000 take part in Locked Shields 2024 exercise, Qantas and JP Morgan hit by data…

A botnet dismantled in January and used by Russia-linked APT28 consisted of more than just Ubiquiti Edge OS routers.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 25-26, Ritz-Carlton, Half Moon Bay, CA]

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Learn More

Designed for senior level cybersecurity leaders to discuss, share and learn innovative information security and risk management strategies, SecurityWeek’s CISO Forum, will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit dives into Threat hunting tools and frameworks, and explores the value of threat intelligence data in the defender’s security stack.

Learn More

Vulnerabilities

Cybercrime

After a journalist for Wired had his digital life wiped away, and his coverage on the topic exposed how their customer service and user experience policies can be exploited for malicious gain, Apple and Amazon have adopted new policies for account access.

BotoPedia, a site similar to Wikipedia, but focusing on bots (both good and bad), made its debut today. It’s the brainchild of Incapsula, a cloud-based website security and performance service, and they’re hoping it will serve as a useful resource for organizations who need help developing Web-based policies.

One of the central figures believed to have been behind the Mariposa botnet is on trial in Slovenia. The suspected mastermind of the botnet, Matjaž Škorjanc, 26, is believed by the authorities to be the hacker known as "Iserdo." Authorities arrested him in Slovenia arrested in 2010. At its height, Mariposa was composed of more than 8 million zombie computers infected with the Butterfly bot (Mariposa is Spanish for butterfly). 

Enigma Module Offers Full Disk Encryption for USB Storage DrivesEnova Technology, a Taiwan-based provider of encryption solutions, on Monday launched a USB encryption solution designed to provide consumers and enterprises with real-time full disk encryption for just about any USB mass storage class drive.

In the physical world, some metropolitan areas manage growth by creating boundaries. In the online world, growth is also controlled with boundaries. And right now, we’re in the middle of setting the course for how the real estate of the Internet will be labeled and accessed for years to come with the Internet Corporation for Assigned Names and Numbers (ICANN) new gTLD Program.

McAfee announced on Tuesday that it has been awarded a multi-year Enterprise Level Agreement contract from the Department of Homeland Security (DHS) that could be valued up to $12 million. Under the contract, McAfee says it plans to provide the DHS with a number of of enterprise wide network and system security products, services and support, including expanding the DHS’s continuous monitoring and security capabilities.

WELLINGTON - (AFP) - Megaupload boss Kim Dotcom on Tuesday accused New Zealand police of kicking and punching him when they raided his Auckland mansion earlier this year to arrest him for alleged copyright piracy.Dotcom told the Auckland High Court he tried to surrender peacefully to police during the raid in January, when about 70 armed police cooperating with a major US online piracy probe raided the mansion.

SEOUL- (AFP) - South Korea's Samsung Electronics said Tuesday it had launched a super-size version of its Galaxy Note smartphone, the latest salvo in its battle with Apple for the multi-billion-dollar handheld market.The Galaxy Note 10.1, which went on sale on Monday in Germany and the United Arab Emirates, is almost twice as wide as its predecessor and nearly the size of a tablet.

Ever wonder how some Twitter accounts seemingly became so popular overnight? According to Barracuda Networks, it is not always due to the person's celebrity or charisma, but instead is tied to a thriving black market for phony social networking accounts.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Adobe is providing incentives for bug bounty hackers to report security flaws in its implementation of Content Credentials and Adobe Firefly.

Cloud Security

Cloud Security

Israeli startup LayerX Security banks $25 million in new financing as investors continue to pour money into secure web browsing technologies.