CONFERENCE Cyber AI & Automation Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Noteworthy stories that might have slipped under the radar: ENISA and NCSC release cybersecurity reports, abuse of Cloudflare services, FBI warns of gen-AI enabling fraud. 

Data privacy solutions provider Ethyca has raised $10 million in a funding round led by Aspenwood Ventures and AVP.

SonicWall has released patches for multiple high-severity flaws in the SMA100 SSL-VPN secure access gateway.

Atrium Health has notified the HHS of a data breach impacting 585,000 individuals, and the incident may be related to online tracking.

Google has announced the open source availability of Vanir, a patch validation tool for Android platform developers.

WatchTowr has published proof-of-concept (PoC) code for an unpatched vulnerability in the Mitel MiCollab enterprise collaboration platform.

A California teen suspected of being a Scattered Spider member left a long trail of evidence and even used an FBI service to launder money.

A critical directory traversal vulnerability in the SailPoint IdentityIQ IAM platform exposes restricted files to attackers.

Japanese device maker confirms zero-day router exploitation and warn that full patches won’t be available for a few weeks.

SecurityWeek’s Cyber AI & Automation Summit took place on December 4th, as an online event.

The newly discovered DroidBot Android trojan targets 77 banks, cryptocurrency exchanges, and national organizations.

People on the Move

Shanta Kohli has been named CMO at Sysdig.

Cloud security firm Sysdig has appointed Sergej Epp as CISO.

F5 has appointed John Maddison as Chief Product Marketing and Technology Alliances Officer.

Video platform Vimeo has appointed Ryan Weeks as Chief Information Security Officer.

LPL Financial has welcomed Renana Friedlich as Chief Information Security Officer.

More People On The Move
China Telecom Hack China Telecom Hack

A top White House official said at least eight U.S. telecom firms and dozens of nations have been impacted by a Chinese hacking campaign.

Russian APT zero-day Russian APT zero-day

Russia’s Turla hackers hijacked 33 command servers operated by Pakistani hackers who had themselves breached Afghanistan and Indian targets.

Solana Web3 supply chain attack Solana Web3 supply chain attack

Supply chain attack leads to decentralized application developers downloading backdoored versions of the Solana Web3.js library.

Top Cybersecurity Headlines

McInerney’s path to becoming a hacker is subtly different to many other hackers. He started as a 22-year old psychology graduate rather than a computer-obsessed 9-year old kid.

The ‘Bootkitty’ prototype UEFI bootkit contains an exploit for LogoFAIL and was created in a South Korea university program.

Russian authorities have reportedly arrested Mikhail Matveev, who is wanted by the US for ransomware attacks against critical infrastructure.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Don’t miss this Live Attack Demonstration to learn how hackers operate and gain knowledge to strengthen your defenses against deepfake and BEC fraud.

Register

Learn how to develop a holistic solution that provides you and your team the power to mitigate cyber threats effectively within your OT environment.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 2025, Stay Tuned]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

Huddle with your peers to measure the costs, benefits, and risks of deploying machine learning and predictive AI tools in the enterprise, the threat from adversarial AI and deepfakes, and preparation for the inevitable compliance and regulations. (December 4, 2024)

Learn More

SecurityWeek’s Identity & Zero Trust Strategies Summit is laser focused on helping organizations to level up their Identity and Zero Trust security strategies. (Oct. 9, 2024)

Learn More

Vulnerabilities

Cybercrime

It’s easy to feel uncertainty about where to start to properly cover all the bases when it comes to securing your infrastructure. Evolving security threats are demanding that protective solutions develop just as rapidly – or faster. It’s not enough to stick to the same generic security measures you’ve always assumed were working, and hope for the best. Hackers are becoming smarter and scrappier, so you have to beat them in both departments too.

I am an optimist by nature, which often makes me a minority amongst many of my colleagues in the security sector. Despite my optimism, I live in fear of a coming Distributed Denial of Service (DDoS) disaster.

The Internet has made virtually any information accessible to someone who is determined to find it. This is great when you need to quickly look something up, but it can be decidedly uncomfortable when you are the target of the search. The Internet not only has tons of information, it also possesses a very long memory, meaning that any information that we expose can live on for a long time. As individuals, this is something that we almost take for...

MOSCOW - A 30-year-old Russian man who is suspected of organizing an hour-long hack attack on the Kremlin website in support of the political opposition faces up to four years in prison, said the FSB security service which investigated the incident.

Last week, researchers discovered a Java vulnerability being widely exploited online, as it was included in several crime kits, including Blackhole and Cool Exploit. On Sunday, Oracle released a patch in order to address the issue, but some experts doubt it will help.

Microsoft has said it would release a patch this afternoon, out-of-band, that will address the recently discovered Internet Explorer vulnerability that has been used in separate targeted attacks. The security fix comes just one week after January’s monthly security release from Redmond.

Anonymous is petitioning the White House to legalize DDoS, urging them to recognize it as a legitimate means of protest. But based on the number of signatures so far, it  seems as though few people agree.

Foxit, the popular alternative to Adobe’s Reader software for PDF files, and the application often recommended as a more secure alternative, has been tagged in a recent vulnerability disclosure. Currently, there is no patch for the issue.

Nokia's Xpress Mobile Browser Decrypts HTTPS TrafficNokia earned some time in front of the InfoSec firing squad this week, after they admitted to intercepting Web traffic sent by its Xpress Mobile Web Browser. Nokia’s interception via proxy was a bit of a known secret, but has gained traction in the news due to a security researcher’s blog post earlier this week.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Google has announced the open source availability of Vanir, a patch validation tool for Android platform developers.

Cloud Security

Cloud Security

Veeam releases patches for two vulnerabilities in Service Provider Console, including a critical-severity remote code execution bug.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.