Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Google releases OSV-SCALIBR, an open source library for software composition analysis and file system scanning.

The US Treasury has sanctioned two individuals and four entities involved in the North Korean fake IT worker scheme.

Industry professionals comment on the Biden administration’s new executive order on cybersecurity. 

Three vulnerabilities in SimpleHelp could allow attackers to compromise the remote access software’s server and the client machine.

Cisco has unveiled AI Defense, a solution designed to help organizations protect development and use of AI applications. 

Microsoft researchers catches Russia’s Star Blizzard hackers spear-phishing with QR codes and WhatsApp group chats.

New research shows that over 4 million systems on the internet, including VPN servers and home routers, are vulnerable to attacks due to tunneling protocol flaws.

Authentication solutions provider Wultra has raised €3 million (~$3.1 million) for its post-quantum technology.

Cannabis retailer Stiiizy says hackers stole the personal information of 380,000 consumers from one of its vendors.

North Korea-linked Lazarus Group is targeting freelance software developers to compromise the supply chain.

Both human and machine identities occupy a unique position: they are simultaneously the foundation of cybersecurity and its weakest link.

People on the Move

Karl Triebes has joined Ivanti as Chief Product Officer.

Steven Hernandez has joined USAID as CISO and Deputy CIO.

Data security and privacy firm Protegrity has named Michael Howard as its CEO.

Anand Ramanathan has been appointed as Chief Product Officer at Deepwatch.

Managed security platform provider Deepwatch has appointed Sammie Walker as CMO.

More People On The Move
Healthcare data breach Healthcare data breach

In 2024 organizations informed the US government about 585 healthcare data breaches affecting a total of nearly 180 million user records.

CISA CISA

Jen Easterly hopes CISA is allowed to continue its election-related work under new leadership despite “contentiousness” around that part of its mission.

Fortinet vulnerability exploited Fortinet vulnerability exploited

Fortinet patches critical vulnerabilities, including a zero-day that has been exploited in the wild since at least November 2024. 

Top Cybersecurity Headlines

Patch Tuesday: Microsoft’s January Patch Tuesday rollout includes fixes for 160 security defects, the largest number of CVEs addressed in any single month since at least 2017.

Attackers are exploiting a critical vulnerability in Aviatrix Controller to execute arbitrary code in AWS cloud environments.

Chinese cyberspies targeted offices dealing with foreign investments and sanctions in the recent US Treasury hack. 

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Explore trends and technologies that will shape the future of cybersecurity. Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 2025, Stay Tuned]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.(February 26, 2025)

Learn More

Supply Chain Security Summit
Join us as we explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects. (March 19, 2025)

Learn More

Vulnerabilities

Cybercrime

WASHINGTON - A criminal inquiry was launched Friday into how a hacker appeared to breach email accounts belonging to former presidents George H.W. Bush and George W. Bush, as well as other members of their family.

It’s funny how often, as I go about my day job in network security assessment and risk management, I run into parallels with other fields. One good example comes from cosmology (although I suppose I should be careful using words like “parallel” about the people who worry about the curvature of space).

Adobe issued an update for its Flash Player on Thursday, which hardens the media player against two vulnerabilities being actively exploited. Of note, is the warning that one of the flaws is being used in drive-by attacks targeting users of both Windows and Mac OS X.

On Thursday, as part of the ritual of advance notification, Microsoft announced its plans to address 57 security vulnerabilities within Windows, Internet Explorer, and Office. Of the 12 bulletins that are addressing the fixes, five are critical while the rest are ranked as important.

SAN JUAN, PUERTO RICO – Trying to identify a vulnerability and fixing it sounds unbelievably frustrating if the person who found it doesn't offer any details. Adobe outlined some of the challenges vendors face with “partial disclosure” at a security conference that took place this week.

BRUSSELS - The European Commission on Thursday launched a new cyber-security plan, aimed at safeguarding vital information systems and bolstering the bloc's defenses against a growing criminal threat. The plan calls on member states to set up specialized agencies to ensure the security of information networks and rapid intervention units to counter any cyber attack.

If 2012 has shown us anything about the security landscape, it’s that we’ve come very far in defending against – and deterring – attacks. And we’ve also learned that while we cannot control attackers themselves, we have endless power in our preparation for, and responses to, their attacks. With all of the new security technology and services available, we have the tools we need to raise the defensibility of every layer of our security shields.

SAN JUAN, PUERTO RICO – So long as wireless carriers and phone manufacturers drag their feet on regular operating system updates, Android users will remain vulnerable to malware and other attacks, a technologist and policy analyst said Monday.

MANILA, Feb 5, 2013 (AFP) - The Philippine Supreme Court has again stopped the government from enforcing a controversial cybercrime law, officials said Tuesday, amid concern it would severely curb Internet freedoms. Justice Secretary Leila de Lima said a fresh "temporary restraining order" (TRO) issued by the Supreme Court meant the law passed last year could not take effect.

Despite the fact that a majority of IT respondents say that their cloud deployments were successful, and have saved their respective organization's money, many still do not trust the cloud with sensitive or personal information. Moreover, some fear storing their data in the cloud due to concerns over government or legal action.

After suffering a breach last week that impacted some 250,000 accounts, Twitter is looking to bolster security by investing in two-factor authentication. The news comes by way of a job posting, where the micro-blogging site has asked security developers to come forward.

A document containing business data, including some personal details, from several regional U.S. financial firms was leaked by Anonymous earlier this week. On Tuesday, the Federal Reserve confirmed that one of their systems was breached, but would not directly link the breach to the data released by Anonymous’ OpLastResort.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Google releases OSV-SCALIBR, an open source library for software composition analysis and file system scanning.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.