Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Predictive attack intelligence and risk protection startup BforeAI has raised $15 million in a Series A funding round led by SYN Ventures.

Palo Alto Networks has shared remediation instructions for organizations whose firewalls have been hacked via CVE-2024-3400.

A new phishing campaign abuses compromised email accounts and targets corporate users with PDF files hosted on Autodesk Drive.

The FTC is sending a total of $5.6 million in refunds to over 117,000 Ring customers as result of a 2023 settlement.

The Brocade SANnav management application is affected by multiple vulnerabilities, including a publicly available root password.

Zero trust endpoint security company ThreatLocker has announced a $115 million Series D funding round that brings the total to $240 million. 

IBM is acquiring HashiCorp for $6.4 billion for its infrastructure lifecycle management and security lifecycle management capabilities.

Pope Francis has called for an international treaty to ensure AI is developed and used ethically, devoting his annual peace message this year to the topic.

Cisco warns that nation state-backed hackers are exploiting at least two zero-day vulnerabilities in its ASA firewall platforms to plant malware on telecommunications and energy sector networks.

KnowBe4 boasts that the merger will create “the largest, advanced AI-driven cybersecurity platform for managing human risk.”

As a security industry, we need to focus our energies on those professionals among us who know how to walk the walk.

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

UK cybersecurity agency NCSC announced Richard Horne as its new CEO.

More People On The Move
Palo Alto Networks Palo Alto Networks

Palo Alto Networks has shared remediation instructions for organizations whose firewalls have been hacked via CVE-2024-3400.

CISA Warns of Windows Print Spooler Flaw After Microsoft Sees Russian Exploitation

CISA warns organizations of a two-year-old Windows Print Spooler vulnerability being exploited in the wild.

Threat Intelligence Report Threat Intelligence Report

Mandiant’s M-Trends 2024 report shows that defenses are improving – and that may be true. But the reality remains that these same statistics demonstrate that if anything, the attackers still retain the upper hand.

Top Cybersecurity Headlines

Predictive attack intelligence and risk protection startup BforeAI has raised $15 million in a Series A funding round led by SYN Ventures.

Palo Alto Networks has shared remediation instructions for organizations whose firewalls have been hacked via CVE-2024-3400.

A new phishing campaign abuses compromised email accounts and targets corporate users with PDF files hosted on Autodesk Drive.

The FTC is sending a total of $5.6 million in refunds to over 117,000 Ring customers as result of a 2023 settlement.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 25-26, Ritz-Carlton, Half Moon Bay, CA]

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Learn More

Designed for senior level cybersecurity leaders to discuss, share and learn innovative information security and risk management strategies, SecurityWeek’s CISO Forum, will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit dives into Threat hunting tools and frameworks, and explores the value of threat intelligence data in the defender’s security stack.

Learn More

Vulnerabilities

Cybercrime

After celebrating the one-year mark for its Web bug bounty program back in February of this year, along with the announcement that, at the time, the search giant had paid out more than $400,000 in rewards to researchers, Google how has upped the ante in hopes that security researchers will further work to find and disclose more critical vulnerabilities on its systems in hopes of making the Google world more secure.

Mobile security firm, NQ Mobile, today announced that Gavin Kim has joined the company as Chief Product Officer. In the created newly position, Kim will lead the company’s product, solutions and strategic partnerships, providing new opportunities for customer and business growth in the United States and global markets.

According to new research from Bit9, 61% of IT security professionals are concerned about attacks from Anonymous or other hacktivists. The data comes from questions given to nearly 2,000 IT security experts in order to discover what keeps them awake at night.

Hackers Allegedly Compromised, Liquidated Brokerage Accounts in $1 Million Trading Account Hacking, Securities Fraud Scheme A Russian national living in New York has been charged with hacking into retail brokerage accounts and using his access to steal nearly a million dollars by executing sham trades.

After more than 20 years with the FBI, the nation’s top cyber cop has made a move to the private sector. Shawn Henry will join two former McAfee executives as President of CrowdStrike Services, a subsidiary of security startup CrowdStrike that will focus on helping organizations protect intellectual property and national security information.

In its latest operation dubbed "#OpBahrain", Anonymous supporters launched a series of DDoS attacks against web sites connected to the wildly popular Formula 1 Racing series. Included in the attacks were domains associated with the official F1 Web site, Formula1.com along with f1.com, both of which resolve to the IP address 195.219.144.30.

HP Awarded Contract to Enhance Assessment of Department of Defense Networks for Vulnerabilities HP today announced that the Defense Information Systems Agency (DISA) has selected HP Enterprise Services as the prime contractor for a program that will provide analytics to enable the assessment of U.S. Department of Defense (DoD) enterprise networks and connected IT systems against DoD standards, as well as any known system vulnerabilities.

The recent move by the FCC and major cell phone carriers to create a database of stolen phones is in response to the danger your smartphone is in from thieves who want to steal and then sell them for profit. What about the hackers who just want the information from your phone – and then hope you continue using it to make financial transactions?

Adding Context Around Data Can Make a Huge Difference in How you Manage and Protect Information.Why is context important? Because without context, information is not really information; it is just data. Data is just “stuff”, while information is what that stuff means.Would you like some plain language context for my point?42.

NEW YORK, NY – Bloomberg Cybersecurity Conference -- Mentioning Pearl Harbor conjures up images of death, destruction and dread, making it a popular metaphor for conveying the devastation that could be caused by a major cyber attack. But there may be a more accurate allegory from World War II – the Japanese invasion of Singapore.

Certificate authorities (CAs) are critical links in the chain that ensures the quality and integrity of enterprise IT security, compliance and operations. CAs issue and ensure valuable third-party trust for human-to-machine and machine-to-machine communications and authentication. However, leveraging the security benefits of trust providers like CAs doesn't relieve your organization of its management responsibilities.

SAIC Plans Cybersecurity Research And Development Center In Melbourne, Australia Science Applications International Corporation (SAIC) today announced its plans to expand its current Australian operations to include a regional cybersecurity research and development (R&D) center in Melbourne, Australia.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Cloud Security

Artificial Intelligence

Cisco announces Hypershield, an AI-native and cloud-native enterprise security solution with a wide range of capabilities.