Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Enzo Biochem says the clinical test information of roughly 2.47 million individuals was exposed in a recent ransomware attack.

Apple has denied working with any government to add backdoors to its products after Russia accused the company of helping the NSA hack iPhones.

A zero-day vulnerability in Progress Software’s MOVEit Transfer product has been exploited to hack organizations and steal their data.

Google is offering a bug bounty reward of up to $180,000 for a full chain exploit leading to a sandbox escape in the Chrome browser.

Kaspersky said its corporate network has been targeted with a zero-click iOS exploit, just as Russia’s FSB said iPhones have been targeted by US intelligence.

Toyota says improper cloud configurations exposed vehicle and customer information in Japan and overseas for years.

Cisco is in the process of acquiring email security firm Armorblox for its predictive and generative artificial intelligence (AI) technology.

Critical authentication bypass and high-severity command injection vulnerabilities have been patched in Moxa’s MXsecurity product.

The FTC charged Amazon-owned Ring with failing to implement basic protections to stop hackers or employees from accessing people’s devices or accounts.

Salesforce ghost sites — domains that are no longer maintained but still accessible — can expose personal information and business data.

Adobe is inviting security researchers to join its private bug bounty program on the HackerOne platform.

Faronics patches critical-severity remote code execution (RCE) vulnerabilities in the Insight education software.

Chrome 114 stable brings 18 security fixes, including 13 for vulnerabilities reported by external researchers.

MOVEit zero-day exploited MOVEit zero-day exploited

A zero-day vulnerability in Progress Software’s MOVEit Transfer product has been exploited to hack organizations and steal their data.

iOS Zero-Day Exploits iOS Zero-Day Exploits

Kaspersky said its corporate network has been targeted with a zero-click iOS exploit, just as Russia’s FSB said iPhones have been targeted by US intelligence.

Gigabyte backdoor Gigabyte backdoor

A backdoor feature found in hundreds of Gigabyte motherboard models can pose a significant supply chain risk to organizations.

Top Cybersecurity Headlines

Enzo Biochem says the clinical test information of roughly 2.47 million individuals was exposed in a recent ransomware attack.

Apple has denied working with any government to add backdoors to its products after Russia accused the company of helping the NSA hack iPhones.

A zero-day vulnerability in Progress Software’s MOVEit Transfer product has been exploited to hack organizations and steal their data.

Google is offering a bug bounty reward of up to $180,000 for a full chain exploit leading to a sandbox escape in the Chrome…

SecurityWeek Industry Experts

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Regsiter

Upcoming Virtual Events

Zero Trust Strategies Summit

Zero Trust is more than a marketing buzzword. In this event, security experts will decipher the confusing world of Zero Trust, and share war stories on securing organizations by eliminating implicit trust and continuously validating every stage of digital interaction.

Learn More
Threat Detection and Incident Response Summit

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence. (May 24, 2023)

Learn More

Designed for senior level cybersecurity leaders to discuss, share and learn innovative information security and risk management strategies, SecurityWeek’s CISO Forum, will take place in 2023 as a virtual event. (June 13-14, 2023)

Learn More

As CISOs and corporate defenders grapple with the intricacies of securing sensitive data passing through multi-cloud deployments and APIs, the importance of frameworks, tools, controls and design models have surfaced to the front burner. (July 19, 2023)

Learn More

Vulnerabilities

Cybercrime

Symantec (Nasdaq: SYMC) today unveiled beta versions of the Norton 2011 AntiVirus and Norton 2011 Internet Security, available now as free download. With performance being a key objective in the latest releases, both products will include “System Insight 2.0” which alerts users when applications are significantly impacting their system resources.

Affinion Security Center, announced enhancements to its BreachShield service, aimed at preventing, detecting and resolving Identity Theft resulting from data breaches. The updates are focused on helping customers at risk for medical identity theft but available for all types of organizations that could experience a data breach.

Cyber warfare is a hot topic in the security industry, but what does this term actually mean? At what point does a cyber conflict become a cyber war? Are cyber threats, cyber attacks and cyber espionage acts of cyber war? Many of these questions need to be discussed – and that discussion is about to take place.

Updated Mac Forensic Suite Features Improved Performance, Enhanced User Interface, and Support for Snow Leopard MacForensicsLab Inc. announced the release of their computer forensic suite, MacForensicsLab 3.0. The new version adds new features along with enhanced stability and speed improvements.

When a new disease surfaces among humans or animals, the first thing we notice are the patterns of spread – not the structure of its DNA.  

As anticipated, Adobe has released security updates for Acrobat and Acrobat Reader Products. These updates are classified as critical as the vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.Adobe recommends users of Adobe Reader 9.3.1 and earlier versions for Windows, Macintosh and UNIX update to Adobe Reader 9.3.2. (For Adobe Reader users on Windows and Macintosh, who cannot update to Adobe Reader 9.3.2

DNS is the address book for the Internet. It’s the way for users, customers and partners to find your online presence and communicate and transact with it. Without DNS, the Web, e-mail, hosted applications, and virtually every mission-critical thing done online would become unusable.

We are barely four months into the year, and 2010 has already proved itself a dream for scammers and fraudsters around the world, filled with opportunity and prosperity. They have had many events working to their advantage, helping them prey on and exploit innocent victims.

On April 13th, Adobe plans to release updates for Acrobat Reader for Windows, Mac and UNIX to resolve critical security issues. The new update, Adobe says, will fix several vulnerabilities and include an improved version of the software that Adobe uses to deliver its updates, helping end-users stay up-to-date in a much more streamlined and automated way. For the latest information, visit the Adobe Product Security Incident Response Team blog at: http://blogs.adobe.com/psirt

Apple today announced the biggest software update yet for the iPhone. iPhone OS 4 will include over 100 new features for iPhone and iPod touch owners, including some much desired security features for the enterprise. Set to be released this summer for iPhone and iPod touch, the update will be available for the iPad in the fall. A version is currently available for developers.

Wolters Kluwer Financial Services announced today the launch of its Wiz Sentri™ Financial Crime Control platform. Utilizing real-time, continuous behavioral and transaction monitoring and analysis, the solution aims to help financial institutions predict and prevent financial crimes before they occur. 

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

NCC Group announces new open source tools for finding hardcoded credentials and for distributing cloud workloads.

Cloud Security

Cloud Security

Salesforce ghost sites — domains that are no longer maintained but still accessible — can expose personal information and business data.