Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Akamai has announced plans to acquire Noname Security to enhance its API protection offering.

Hundreds of companies are showcasing their products and services this week at the 2024 edition of the RSA Conference in San Francisco.

LevelBlue, a new WillJam Ventures and AT&T joint venture, provides various managed cybersecurity services.

As cyber threats grow more sophisticated, America cannot afford complacency. The time for decisive action and enhanced cyber resilience is now.

The US calls for international engagement towards building an open, inclusive, resilient, safe, and equitable digital space.

Germany recalled its ambassador to Russia for a week of consultations in Berlin following an alleged hacker attack on Chancellor Olaf Scholz’s party.

MITRE has shared more details on the recent hack, including the new malware involved in the attack and a timeline of the attacker’s activities.

Google rolls out new threat-intel and security operations products and looks to the magic of AI to tap into the booming cybersecurity market.

Synopsys is selling its Software Integrity Group to private equity firms Clearlake Capital and Francisco Partners in a $2.1 billion deal. 

Iranian state-sponsored group APT42 is targeting NGOs, government, and intergovernmental organizations with two new backdoors.

CyberNut has emerged from stealth mode with a K-12-focused security awareness training solution and $800k in pre-seed funding.

People on the Move

Morgan M. Adamski has been named the Executive Director of USCYBERCOM.

Passwordless authentication firm Hawcx has appointed Lakshmi Sharma as Chief Product Officer.

Matt Hartley has been named Chief Revenue Officer at autonomous security solutions provider Horizon3.ai.

Trustwave has announced the appointment of Keith Ibarguen as Senior Vice President of Engineering.

Lital Asher–Dotan has been hired as Chief Marketing Officer at Beyond Identity.

More People On The Move
MITRE hacked MITRE hacked

MITRE has shared more details on the recent hack, including the new malware involved in the attack and a timeline of the attacker’s activities.

Iranian Cyberspies Hit Targets With New Backdoors

Iranian state-sponsored group APT42 is targeting NGOs, government, and intergovernmental organizations with two new backdoors.

Microsoft Microsoft

Microsoft security chief Charlie Bell pledges significant reforms and a strategic shift to prioritize security above all other product features.

Top Cybersecurity Headlines

Akamai has announced plans to acquire Noname Security to enhance its API protection offering.

Hundreds of companies are showcasing their products and services this week at the 2024 edition of the RSA Conference in San Francisco.

LevelBlue, a new WillJam Ventures and AT&T joint venture, provides various managed cybersecurity services.

As cyber threats grow more sophisticated, America cannot afford complacency. The time for decisive action and enhanced cyber resilience is now.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 25-26, Ritz-Carlton, Half Moon Bay, CA]

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Learn More

Designed for senior level cybersecurity leaders to discuss, share and learn innovative information security and risk management strategies, SecurityWeek’s CISO Forum, will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit dives into Threat hunting tools and frameworks, and explores the value of threat intelligence data in the defender’s security stack.

Learn More

Vulnerabilities

Cybercrime

Nominum, a vendor that focuses on DNS and security solutions for enterprises and service providers, announced a new addition to its Nominum Mobile Suite on Wednesday, the Mobile Network and User Security solution.According to the company, the goal of the newest addition is to reduce latency and network failure, and protect mobile networks from increasing attacks.

Yahoo has since released an updated extension to address the issue, which was discovered by a security researcher shortly after Yahoo announced Axis. When Yahoo released its new Axis extension for Google's Chrome browser Wednesday, the company accidentally disclosed a private signing key that could be abused by an attacker.

Protegrity, a provider of data security solutions, on Wednesday announced Protegrity Vaultless Tokenization, an offering designed to help payment processors and gateways cost-effectively provide tokenization services to their clients.That company says it can now support the largest companies in the payments industry with a lightweight tokenization solution that can scale to thousands of merchants, quickly, without the cost and complexity of backend database infrastructure.

The National Centers of Academic Excellence in Cyber Operations Program, an initiative of the National Security Agency, aims to increase the amount of professionals with expertise in this area. The program is designed to identify institutions that offer a deeply technical, interdisciplinary curriculum centered on fields such as computer science, computer engineering, and electrical engineering. In addition, it supports the government's work to better protect cyberspace.

Polytechnic Institute of New York University (NYU-Poly) is introducing a management track to its master’s degree in cyber security. The first classes begin this summer."We created the management track in response to calls from industry for highly qualified executives with strong technical knowledge," said NYU-Poly Computer Science and Engineering Professor Nasir Memon."It will prepare graduates to manage a team of cyber-security personnel as well as a command of the business acumen to secure information in line with company objectives."

Intel has released a single sign-on application that will enable enterprises to use Salesforce.com credentials on all of the Force.com applications, in addition to scores of others across the Web. More over, Intel’s Cloud SSO service offers two-factor authentication options and has detailed reporting implemented from the start.

ICSA Labs this week launched a testing program designed to help determine whether smartphones and tables meet the latest security standards for connecting with Virtual Private Networks (VPNs).Generically named “Mobile Device VPN Security”, the new program is available immediately for wireless carriers and mobile device manufacturers. According to ICSA Labs, Verizon Wireless is the program's first customer—not surprising since ICSA Labs is a division of Verizon.

Revelations about a recent breach of confidential data in Utah highlights how configuration errors can end up being costly.A recent data breach that exposed personal information for nearly 800,000 people in Utah also exposed how lethal configuration mistakes and policy failures can be in the world of security.

For those purists within the auditing and network exploration community, there is good news this week – Nmap version 6.0 has been released to the public. Nmap is the standard for security audits and exploration, and the latest version has some useful improvements.Version 6 includes improvements to the Nmap Scripting Engine (NSE), which includes a bump in script count. Nmap 5 included a script count of 59, where version 6 has grown to 348, and each one has been documented and...

The popularity of the Android platform, combined with the openness that it represents, has created model that allows developers of all shapes and sizes to create unique works. Yet, this same openness has allowed criminals to create works with malicious intent. Thus, a North Carolina State University researcher has sat out to map the Android Malware Genome in an effort to spread information and combat the malicious side of Android development.

Building on their previous initiative to warn users who display symptoms of infections, Google said on Tuesday that they would start notifying users who are impacted by DNSChanger malware.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Adobe is providing incentives for bug bounty hackers to report security flaws in its implementation of Content Credentials and Adobe Firefly.

Cloud Security

Artificial Intelligence

Google rolls out new threat-intel and security operations products and looks to the magic of AI to tap into the booming cybersecurity market.