Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

A new Silicon Valley startup called Mimic is coming out of the shadows with a hefty $27 million seed-stage funding round led by Ballistic Ventures.

As you look to navigate RSA Conference, with so many vendors, approaches and solutions, how do you know what solutions you should be investing in?

Israeli AI security firm Apex has received $7 million in seed funding for its detection, investigation, and response platform.

Cybersecurity startups Insane Cyber, Resonance Security, RunReveal and StepSecurity announce pre-seed, early-stage, and seed funding rounds.

Network detection and response (NDR) provider Corelight has raised $150 million in a Series D funding round led by Accel.

Verizon’s 2024 DBIR shows that vulnerability exploitation increased three times and confirmed data breaches doubled compared to the previous year.

Japan’s Prime Minister unveiled an international framework for regulation and use of generative AI, adding to global efforts on governance for the rapidly advancing technology.

CISA says a critical GitLab password reset flaw is being exploited in attacks and roughly 1,400 servers have not been patched.

Government agencies are sharing recommendations following attacks claimed by pro-Russian hacktivists on ICS/OT systems.

Dropbox says hackers breached its Sign production environment and accessed customer email addresses and hashed passwords. 

UnitedHealth CEO Andrew Witty said in a U.S. Senate hearing that his company is still trying to understand why the server did not have the additional protection.

People on the Move

Trustwave has announced the appointment of Keith Ibarguen as Senior Vice President of Engineering.

Lital Asher–Dotan has been hired as Chief Marketing Officer at Beyond Identity.

Tidal Cyber announced that Jennifer Leggio has been appointed Chief Operating Officer.

Google spinoff SandboxAQ has hired Chris Bates as its first CISO.

HackerOne CEO Marten Mickos announced that he will be retiring from the company after nine years.

More People On The Move
Dropbox data breach Dropbox data breach

Dropbox says hackers breached its Sign production environment and accessed customer email addresses and hashed passwords. 

Interview Geoff Belknap, CISO at LinkedIn, and Guy Rosen, CISO at Facebook parent company Meta. Interview Geoff Belknap, CISO at LinkedIn, and Guy Rosen, CISO at Facebook parent company Meta.

SecurityWeek interviews Geoff Belknap, CISO at LinkedIn, and Guy Rosen, CISO at Facebook parent company Meta.

UnitedHealth UnitedHealth

UnitedHealth Group’s CEO Andrew Witty shares details on the damaging cyberattack in testimony before a US Congress committee set for May 1, 2024.

Top Cybersecurity Headlines

A new Silicon Valley startup called Mimic is coming out of the shadows with a hefty $27 million seed-stage funding round led by Ballistic…

As you look to navigate RSA Conference, with so many vendors, approaches and solutions, how do you know what solutions you should be investing…

Israeli AI security firm Apex has received $7 million in seed funding for its detection, investigation, and response platform.

Cybersecurity startups Insane Cyber, Resonance Security, RunReveal and StepSecurity announce pre-seed, early-stage, and seed funding rounds.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 25-26, Ritz-Carlton, Half Moon Bay, CA]

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Learn More

Designed for senior level cybersecurity leaders to discuss, share and learn innovative information security and risk management strategies, SecurityWeek’s CISO Forum, will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit dives into Threat hunting tools and frameworks, and explores the value of threat intelligence data in the defender’s security stack.

Learn More

Vulnerabilities

Cybercrime

Network security firm Cyberoam has released an update for all of its unified threat management (UTM) devices in response to the leak of the default private key used by all of the company's UTM devices. The company pushed the fix out over-the-air after an anonymous poster leaked the key online. The update forces devices to use unique certificate authority (CA) SSL certificates when intercepting SSL traffic on corporate networks.

Law enforcement demanded access to text messages, caller locations, and other data 1.3 million times in 2011. These figures come from a series of reports issued by the nation’s cellphone carriers, as requested by Congress, and marks the first time such data has been made available.According to the New York Times, the reports document “an explosion in cellphone surveillance in the last five years, with the companies turning over records thousands of times a day in response to police emergencies,...

The developer for DarkComet, a Remote Access Tool (Trojan), has pulled the application and ended development. The tool’s less than stellar reputation, as well as legal concerns, were listed as two of the main reasons for the project’s abrupt conclusion.Jean-Pierre Lesueur, the one responsible for bringing DarkComet to the masses, said that he toiled away at DarkComet for years and offered it freely in exchange for one thing - that those using it would do so responsibly. However, clearly that...

AlienVault, the San Mateo, California-based company behind open source SIEM, OSSIM, and the AlienVault Open Threat Exchange, today announced that it has closed a $22.4 million Series C funding round led by Kleiner Perkins Caufield & Byers (KPCB) and Sigma—two prominent venture firms.

Yesterday, SecurityWeek reported on a blog post by Microsoft security researcher Terry Zink, who said that a spammer had control of Android devices. As it turns out, while malware on the Android platform is a reality, spammers may not have gained total control.  “All of these message are sent from Android devices,” Zink wrote initially. He was commenting on an unusually high number of junk emails that had Yahoo Mail headers, and an Android-based signature.

After the discovery of systems infected with an unknown family of malware at India’s Eastern Naval Command, the country has quickly pinned the blame on China. India’s accusal is based on the fact that data harvested from the infected systems was copied to a server with a IP address in China.

In a letter sent to partners, Jay Bavisi, President and CEO of the EC-Council, said that the company responsible for making Certified Ethical Hackers (C|EH) had launched an investigation after one of their own embezzled company funds.

A Google Android botnet has been spotted spamming messages pushing counterfeit medication. According to Sophos, the activity represents the latest way to monetize Android botnets. Traditionally, mobile malware has made money by intercepting SMS messages used as part of two-factor authentication mechanisms for online banks and charging fees for premium-rate SMS messages. This botnet however is sending messages that push Viagra and Cialis.

Apple’s closed model, while criticized by many, has kept iPhone and iPad users relatively safe from malware and other potentially malicious apps, especially when compared to Android users.While some iOS apps have been called into question before over privacy concerns and aggressive advertising tactics, Kaspersky Lab researchers are saying they have discovered an iOS app that they are outright calling malware.

The latest iteration of PCI compliance regulations adds to the already increasing burdens of the typical IT security professional. With it comes fear, uncertainty and doubt for those looking to execute PCI compliance controls properly and in turn to preserve their jobs. I had a chance recently to present as a guest keynote speaker at the North America CACS ISACE conference on implementing sound compliance and audit controls for key management.

Venafi, a Salt Lake City, Utah-based provider of enterprise key and certificate management solutions, has shared the results of scans performed on 450 Global 2000 companies, revealing that on average, nearly one in five digital security certificates deployed by the organizations rely on a technology that makes them open targets for Flame-, Stuxnet- and Duqu-style malware breaches.

CrowdStrike Streamlines Malware Reverse Engineering With CrowdREArmed with $26 million in venture funding, security startup CrowdStrike has released a tool designed to make it faster to reverse engineer malicious files by encouraging researchers to work together on a cloud-based collaboration platform.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Adobe is providing incentives for bug bounty hackers to report security flaws in its implementation of Content Credentials and Adobe Firefly.

Cloud Security