CONFERENCE On Demand: Cyber AI & Automation Summit - Watch Now
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Researchers have warned that powerful AI models could be used to supercharge online disinformation, cyberattacks or creation of bioweapons.

San Francisco startup gets fresh capital from Battery Ventures to compete in the crowded identity and access management space.

Noteworthy stories that might have slipped under the radar: fake Lockdown Mode, a new Linux RAT, jailbreaking AI, and an entire country’s DNS hijacked.

French startup ProvenRun raises €15 million investment to build secure software for connected vehicles and IoT devices.

WordPress 6.4.2 patches a flaw that could be chained with another vulnerability to execute arbitrary code.

Russian threat actor APT28 has been exploiting a no-interaction Outlook vulnerability in attacks against 14 countries.

The US and UK announce charges and sanctions against two hackers working with Russia’s FSB security service.

A Bluetooth authentication bypass allows attackers to connect to vulnerable Android, Linux, and Apple devices and inject keystrokes.

Hackers launched a cyberattack on an Irish water utility, causing disruption and leaving people without water for two days. 

End-to-End encryption in Facebook Messenger means that no one other than the sender and the recipient — not even Meta — can decipher people’s messages.

The US cybersecurity agency calls attention to a Russian APT targeting academia, defense, governmental organizations, NGOs and think-tanks.

A study commissioned by Apple shows that 2.6 billion personal data records were compromised in breaches in the past two years.

Government agencies in the Five Eyes countries have published new guidance on creating memory safety roadmaps.

Nissan Oceania says it has been working on restoring its systems after falling victim to a cyberattack.

Pool Party is a new set of eight Windows process injection techniques that evade endpoint detection and response solutions.

Artificial Intelligence Act Artificial Intelligence Act

Researchers have warned that powerful AI models could be used to supercharge online disinformation, cyberattacks or creation of bioweapons.

Hackers targeting Water systems in Ireland Hackers targeting Water systems in Ireland

Hackers launched a cyberattack on an Irish water utility, causing disruption and leaving people without water for two days. 

SLAM CPU attack SLAM CPU attack

Security features that major CPU vendors plan on integrating into their future products can increase the surface for certain types of attacks.

Top Cybersecurity Headlines

Researchers have warned that powerful AI models could be used to supercharge online disinformation, cyberattacks or creation of bioweapons.

San Francisco startup gets fresh capital from Battery Ventures to compete in the crowded identity and access management space.

Noteworthy stories that might have slipped under the radar: fake Lockdown Mode, a new Linux RAT, jailbreaking AI, and an entire country’s DNS hijacked.

French startup ProvenRun raises €15 million investment to build secure software for connected vehicles and IoT devices.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join us as we delve into the transformative potential of AI, predictive ChatGPT-like tools and automation to detect and defend against cyberattacks.

Register

Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.

Watch Now

Upcoming Virtual Events

CISOs and risk management leaders must understand clearly the role of cyber insurance in a robust security program, ongoing changes to premiums and policy pricing, the errors that could deny coverage and how it all fits into global incident response planning.

Learn More
Cyber AI & Automation Summit

SecurityWeek’s inaugural Cyber AI & Automation Summit pushes the boundaries of security discussions by exploring the implications and applications of predictive AI, machine learning, and automation in modern cybersecurity programs.

Learn More

Designed for senior level cybersecurity leaders to discuss, share and learn innovative information security and risk management strategies, SecurityWeek’s CISO Forum, will take place in 2023 as a virtual event. (June 13-14, 2023)

Learn More

As CISOs and corporate defenders grapple with the intricacies of securing sensitive data passing through multi-cloud deployments and APIs, the importance of frameworks, tools, controls and design models have surfaced to the front burner. (July 19, 2023)

Learn More

Vulnerabilities

Cybercrime

Recovering from a breach can be expensive, just ask Sony or any other company that has fallen victim to a cyber attack recently. Not only are the costs stemming from investigations, breach notifications and fines expensive for organizations, the damage done to a brand and loss of customer confidence can be incredibly costly.

Seattle based WatchGuard Technologies, on Monday announced that it has extended its next-generation firewall (NGFW) capabilities, including advanced firewalling, application control, and intrusion prevention system (IPS), to its XTM 8 Series of security appliances, making enterprise-class NGFW features available to businesses that perhaps aren’t big enough to justify the investment in a typical enterprise-class firewall.

Google today said it had acquired the domain name “G.CO”, a name that the company says it will use exclusively to link to official Google products and services, helping users be more confident that when they click on a "G.CO" link, they are taken what should be a safe URL, operated by Google.

The battle for top talent in the tech industry isn’t limited to Facebook, Apple and Google quarreling to hire and retain top talent. Splunk, a provider of operational intelligence software, today announced that it has hired David Conte as the company’s first Chief Financial Officer.

RIM this week released a security advisory to address a vulnerability in the BlackBerry Administration API included in the BlackBerry Enterprise Server that may allow an attacker with user permissions granted to the BlackBerry Administration API to disclose sensitive information or cause a denial-of-service condition.

It looks like Netflix isn’t the only company jacking up its rates this week. VeriSign, the Internet infrastructure giant that ICAAN recently awarded (via renewal) the contract to serve as the authoritative registry operator for the .net registry for another six years, said it would be raising the fees for its domain registration services.

We all have relatives who never see a doctor because they just don’t want to know if there is something really wrong with them. Living a left-brain life (i.e., logical, analytical), I always cringe and unsuccessfully suggest the ‘more information is better’ approach to medical care when my relatives channel their ostrich spirits. Somehow the concept of plausible deniability breaks down when thinking about the early detection potentially fatal disease. Just another confirmation of my adoption.

Below is a Full Text Transcript of Remarks on the Department of Defense Cyber Strategy from Deputy Defense Secretary William J. Lynn III, as the Defense Department's Strategy for Operating in Cyberspace was revealed at National Defense University at Fort Lesley J. McNair in Washington.As Delivered by Deputy Secretary of Defense William J. Lynn, III, on Thursday, July 14, 2011

Add mice and keyboards to the list of UBS-based peripherals now suspect in any corporate environment. In recent weeks several gadget blogs have been discussing new ways to make the USB HID (Human Interface Device) a viable vector for malware. This is hardware hacking that should be of interest to corporate IT staff. While some of these use cases are not elegant, requiring someone to convince someone else to use a modified device, we've seen clever social engineering in the...

The results of a recent survey released today by Men's Health Network and Cephalon, found that shift workers, people who work non-traditional hours including IT professionals working overnight shifts, report that these shifts can negatively impact their health, work and well-being.

At Cisco Live, the company's annual IT and communications conference, Cisco today introduced new technology to increase the efficiency and security of cloud-based networks, including new email security features for its IronPort Email Security solution.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Government agencies in the Five Eyes countries have published new guidance on creating memory safety roadmaps.

Cloud Security

Cloud Security

While applications and cloud infrastructure present different risk profiles and require different security assessments, they must not be viewed separately with regards to enterprise...