CONFERENCE On Demand: Cyber AI & Automation Summit - Watch Now
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Researchers have warned that powerful AI models could be used to supercharge online disinformation, cyberattacks or creation of bioweapons.

San Francisco startup gets fresh capital from Battery Ventures to compete in the crowded identity and access management space.

Noteworthy stories that might have slipped under the radar: fake Lockdown Mode, a new Linux RAT, jailbreaking AI, and an entire country’s DNS hijacked.

French startup ProvenRun raises €15 million investment to build secure software for connected vehicles and IoT devices.

WordPress 6.4.2 patches a flaw that could be chained with another vulnerability to execute arbitrary code.

Russian threat actor APT28 has been exploiting a no-interaction Outlook vulnerability in attacks against 14 countries.

The US and UK announce charges and sanctions against two hackers working with Russia’s FSB security service.

A Bluetooth authentication bypass allows attackers to connect to vulnerable Android, Linux, and Apple devices and inject keystrokes.

Hackers launched a cyberattack on an Irish water utility, causing disruption and leaving people without water for two days. 

End-to-End encryption in Facebook Messenger means that no one other than the sender and the recipient — not even Meta — can decipher people’s messages.

The US cybersecurity agency calls attention to a Russian APT targeting academia, defense, governmental organizations, NGOs and think-tanks.

A study commissioned by Apple shows that 2.6 billion personal data records were compromised in breaches in the past two years.

Government agencies in the Five Eyes countries have published new guidance on creating memory safety roadmaps.

Nissan Oceania says it has been working on restoring its systems after falling victim to a cyberattack.

Pool Party is a new set of eight Windows process injection techniques that evade endpoint detection and response solutions.

Artificial Intelligence Act Artificial Intelligence Act

Researchers have warned that powerful AI models could be used to supercharge online disinformation, cyberattacks or creation of bioweapons.

Hackers targeting Water systems in Ireland Hackers targeting Water systems in Ireland

Hackers launched a cyberattack on an Irish water utility, causing disruption and leaving people without water for two days. 

SLAM CPU attack SLAM CPU attack

Security features that major CPU vendors plan on integrating into their future products can increase the surface for certain types of attacks.

Top Cybersecurity Headlines

Researchers have warned that powerful AI models could be used to supercharge online disinformation, cyberattacks or creation of bioweapons.

San Francisco startup gets fresh capital from Battery Ventures to compete in the crowded identity and access management space.

Noteworthy stories that might have slipped under the radar: fake Lockdown Mode, a new Linux RAT, jailbreaking AI, and an entire country’s DNS hijacked.

French startup ProvenRun raises €15 million investment to build secure software for connected vehicles and IoT devices.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join us as we delve into the transformative potential of AI, predictive ChatGPT-like tools and automation to detect and defend against cyberattacks.

Register

Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.

Watch Now

Upcoming Virtual Events

CISOs and risk management leaders must understand clearly the role of cyber insurance in a robust security program, ongoing changes to premiums and policy pricing, the errors that could deny coverage and how it all fits into global incident response planning.

Learn More
Cyber AI & Automation Summit

SecurityWeek’s inaugural Cyber AI & Automation Summit pushes the boundaries of security discussions by exploring the implications and applications of predictive AI, machine learning, and automation in modern cybersecurity programs.

Learn More

Designed for senior level cybersecurity leaders to discuss, share and learn innovative information security and risk management strategies, SecurityWeek’s CISO Forum, will take place in 2023 as a virtual event. (June 13-14, 2023)

Learn More

As CISOs and corporate defenders grapple with the intricacies of securing sensitive data passing through multi-cloud deployments and APIs, the importance of frameworks, tools, controls and design models have surfaced to the front burner. (July 19, 2023)

Learn More

Vulnerabilities

Cybercrime

When he was a puppy, my dog watched a lady bug crawl across a window on our back porch. Eventually, the lady bug fell, and as it lay upside down on the carpet flipping its wings and wiggling its legs, my dog snapped it up, licking his chops. He immediately started gacking, and soon spit the lady bug back out, scraping the roof of his mouth with his tongue. Later that day, another lady bug dropped next to him, and...

In response to an article published by NPR surrounding the recent arrest of alleged members of the Anonymous hacking group, Anonymous & Lulz Security, in a joint statement, responded with an open letter to the FBI and “international law authorities,” and specifically responding to statements from FBI director Steve Chabinsky.

NATO Hacked By Anonymous: Claims SQL Injection Attack Yielded 1GB of Restricted Data Highly flying, and highly visible hacktivist group Anonymous, is claiming it has hacked into a NATO system, and is sitting on approximately a gigabyte of NATO restricted data. Interestingly, the group is saying they probably won’t publish the data, as it would be “irresponsible,” as the group described it.

We’re seeing a fast-growing trend in the hacking community that, sadly, many aren’t noticing: search engines can be turned into tools for attackers in numerous ways. What can businesses do to fight back?The Basics: Exploiting Hot Topics

Following yesterday's announcement of record quarterly revenue of $28.57 billion and record quarterly profit of $7.31 billion, Apple today launched Mac OS X Lion, the eighth major release of its operating system.While OS X Lion flaunts more than 250 new features, we thought it would be appropriate to run through them and highlight some of the security and privacy related features that would be of interest to our security-minded audience.

Skydera C3 Developer Edition Enables Cloud Command & Control for Amazon AWS, RackSpace, GoGrid, SliceHost Skydera, a provider of cross-cloud IT automation solutions, today launched Skydera C3 Developer Edition, a solution that brings developers enterprise-grade security to public cloud and hybrid cloud environments, and true developer self-service.

Have you considered how you’ll secure your IPv6 infrastructure? Even if you aren’t implementing an IPv6 network, you still need to be concerned about the transition. Here is how can you be sure your network remains protected as the industry moves towards IPv6.

RedSeal Systems, Inc., a provider of network security optimization solutions that help companies identify holes in their security infrastructure, announced that it has appointed existing board member and security industry expert Parveen Jain as the company's new chief executive officer.

The Pennsylvania Department of Banking today warned the public about an advance fee loan scam being carried out on the Internet under the name Ridley Creek Financing Group.According to the Department of Banking, the company's Web site solicits personal loans and asks for personal financial information, such as Social Security numbers, which could be used to commit identity fraud and drain victim's accounts. The company also asks for funds to be wired to process the loan.

Survey Reveals That IT Security Personnel Are Making Dangerous Security Trade-OffsWith the significant spike in recent data breaches and cyber attacks, organizations around the world are scrambling to implement additional security measures to help develop a strong security posture.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Government agencies in the Five Eyes countries have published new guidance on creating memory safety roadmaps.

Cloud Security

Cloud Security

While applications and cloud infrastructure present different risk profiles and require different security assessments, they must not be viewed separately with regards to enterprise...