Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

The authentication bypass vulnerability, tagged as CVE-2025-22230, carries a CVSS severity score of 7.8/10.

Microsoft has expanded the capabilities of Security Copilot with AI agents tackling data security, phishing, and identity management.

Charm Security has emerged from stealth mode with $8 million in funding for AI-powered scams and social engineering prevention.

Email-related data breach suffered by wheelchair and other mobility equipment provider Numotion affects almost 500,000 individuals. 

Which Security Testing Approach is Right for You: BAS, Automated Penetration Testing, or Both?

Weaver Ant, a cyberespionage-focused APT operating out of China, is targeting telecom providers for persistent access.

Threats themselves change very little, but the tactics used are continually revised to maximize the criminals’ return on investment and effort.

Frank Trezza is fairly typical of most hackers. Early pranks sometimes leading to something more serious.

Authorities in seven African countries arrested 300 suspects in an international crackdown on cybercriminal networks targeting businesses.

Critical remote code execution vulnerabilities found by Wiz researchers in Ingress NGINX Controller for Kubernetes.

The effects of the backlog are already being felt in vulnerability management circles where NVD data promises an enriched source of truth.

People on the Move

Tabitha Craig has been named the CISO of the Congressional Budget Office (CBO).

Life360 has appointed Vari Bindra, former Amazon cybersecurity lead, as Chief Information Security Officer.

Forcepoint has appointed Guy Shamilov as CISO, Bakshi Kohli as CTO and Naveen Palavalli as CPO and CMO.

Paul Calatayud has been named CISO of developer security posture management firm Archipelo.

Cyber readiness and response firm Sygnia has appointed Avi Golan as its new CEO.

More People On The Move
IngressNightmare Kubernetes cloud vulnerabilities IngressNightmare Kubernetes cloud vulnerabilities

Critical remote code execution vulnerabilities found by Wiz researchers in Ingress NGINX Controller for Kubernetes.

FCC China investigation FCC China investigation

The FCC is investigating whether Chinese firms such as Huawei, ZTE and China Telecom are still operating in the US.

GitHub supply chain attack GitHub supply chain attack

More details have come to light on the recent supply chain attack targeting GitHub Actions, including its root cause.

Top Cybersecurity Headlines

Attacks involving Paragon’s Graphite spyware involved a WhatsApp zero-day that could be exploited without any user interaction.

News analysis: Google positions itself to compete with Microsoft for enterprise security dollars. How does this deal affect startup ecosystem?

A long-running campaign phishing for credentials through scareware recently switched to targeting macOS users.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

This webinar will guide you in aligning your security testing strategy with the right tools, helping you move beyond identifying weaknesses to effectively validating your overall security posture.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

This event delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Learn More

Supply Chain Security Summit
Join us as we explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects. (March 19, 2025)

Learn More

Vulnerabilities

Cybercrime

Network security vendor Palo Alto Networks, today announced that its next generation firewalls have achieved Common Criteria certification at Evaluation Assurance Level 4+ (EAL4+), making Palo Alto Networks firewalls validated for deployment in critical infrastructures, ranging from national governments to enterprise and financial institution networks.

Fixmo, a provider of mobile security and risk management solutions, today launched Fixmo SharePlace, a data leakage prevention (DLP) solution designed to provide secure and compliant remote access to Microsoft SharePoint from iOS and Android devices.

Today’s businesses must be able to rapidly adapt to changing market conditions – to support a new venture, merger/acquisition, etc. As business needs change, so too must the underlying security policies.

The Research and Education Networking Information Sharing and Analysis Center, or REN-ISAC, recently issued an alert to administrators and IT staffers at some of the world’s most notable institutions of higher learning that urges them to take the matter of securing DNS seriously.

NEW YORK - The New Yorker magazine on Wednesday unveiled a new online system for anonymous whistleblower tips, based on technology developed by the late Internet activist Aaron Swartz and a former hacker.

McAfee pulled the curtain back on a new biometric protection suite on Tuesday, promising uniform data protection across multiple platforms, including Mac OS X, iOS, Windows, and Android.

Would you mind a stranger taking your picture as you eat ice cream on a bench outside? What if your spouse and kids were also in the shot? Kind of creepy. Lots of folks have a negative reaction to stranger taking their pictures. They feel their rights have been impinged. But the rights you feel you deserve and the rights you have under the law can be very different. Let’s see what rights you really have with your image.

Bitcoin’s wiki defines it to be “an experimental, decentralized digital currency”. As with any experimental system, if it proves to be successful then it is usually followed by a finalized product which builds on the parts that worked well on the experiment and removes the parts proved to be irrelevant.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Google has integrated OSV-SCALIBR features into OSV-Scanner, its free vulnerability scanner for open source developers.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.