Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

ZeroRISC has raised $10 million in seed funding for production-grade open source silicon security, built on OpenTitan designs.

Citizen Lab publishes forensic proof that spyware maker Paragon can compromise up-to-date iPhones. Journalists in Europe among victims.

AI-generated voice deepfakes have crossed the uncanny valley, fueling a surge in fraud that outpaces traditional security measures. Detection technology is racing to keep up.

Hirundo tackles AI hallucinations and bias by making trained models “forget” poisoned, malicious, and confidential data.

The new attack technique uses smartwatches to capture ultrasonic covert communication in air-gapped environments and exfiltrate data.

Learn how attackers hide in plain sight—and what you can do to stop them without slowing down your business.

Microsoft recently patched CVE-2025-32711, a vulnerability that could have been used for zero-click attacks to steal data from Copilot.

It’s time for enterprises to stop treating unmanaged devices as an edge case and start securing them as part of a unified Zero Trust strategy.

Between May 2024 and April 2025, Cloudflare blocked 109 billion malicious requests targeting organizations protected under Project Galileo.

Palo Alto Networks has released patches for seven vulnerabilities and incorporated the latest Chrome fixes in its products.

Interpol has announced a crackdown on infostealer malware in Asia as part of an effort called Operation Secure.

People on the Move

SAP security firm SecurityBridge announced the appointment of Roman Schubiger as the company’s new CRO.

Cybersecurity training and simulations provider SimSpace has appointed Peter Lee as Chief Executive Officer.

Orchid Security has appointed a new Chief Product Officer and three advisors.

Kaseya has appointed Rania Succar as Chief Executive Officer.

Identity security company Silverfort has appointed Howard Greenfield as President and Chief Revenue Officer.

More People On The Move
SmartAttack air gap attack SmartAttack air gap attack

The new attack technique uses smartwatches to capture ultrasonic covert communication in air-gapped environments and exfiltrate data.

Interpol targets infostealers Interpol targets infostealers

Interpol has announced a crackdown on infostealer malware in Asia as part of an effort called Operation Secure.

Cyera funding Cyera funding

Series E funding round brings Cyera’s total funding to over $1.3 billion and values the data security firm at $6 billion.

Top Cybersecurity Headlines

Redmond warns that external control of a file name or path in WebDAV “allows an unauthorized attacker to execute code over a network.”

United Natural Foods has taken some systems offline after detecting unauthorized activity on its IT systems, causing disruptions to operations.

President Trump says his new cybersecurity executive order amends problematic elements of Biden- and Obama-era executive orders.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Register

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

MOSCOW - Russian President Vladimir Putin and US President Barack Obama have ordered the chiefs of their respective security agencies to find a way out of the impasse caused by fugitive leaker Edward Snowden's stay in a Moscow airport, a senior official said on Monday.

Steven Spielberg certainly knows how to leave an indelible impression. So much so that when I see the words “DDoS attacks,” I also see a big ol’ Great White and can’t help but hear John Williams’ infamous score. Dun dun . . . dun dun . . .

Attackers Used Brute Force Attacks Against Internet-Facing Controls Systems at Gas Compressor StationsIn its latest monthly report designed to promote preparedness, information sharing, and collaboration across infrastructure sectors, The Department of Homeland Security’s ICS-CERT publicly revealed information on a series of attacks that targeted gas compressor station operators earlier this year.

BRUSSELS - A long-awaited trade deal between the European Union and the United States could be in jeopardy over allegations that Washington bugged EU offices, European Justice Commissioner Viviane Reding warned on Sunday.

BRUSSELS - The European Union angrily demanded answers from the United States on Sunday over allegations Washington had bugged its offices, the latest spying claim attributed to fugitive leaker Edward Snowden.

WASHINGTON - Hunted as a US traitor and at the center of a diplomatic row, Edward Snowden got off to a less spectacular start in life: he is a self-confessed geek and high school dropout.

While it changes nothing about NSA leaker Edward Snowden's situation, the Pentagon has said that new whistleblower protections for Department of Defense (DoD) contractors will go into effect July 1. So starting Monday, many of the existing loopholes will be closed, but it isn’t clear if this will help stem the flow of information to the public form connected insiders.

WASHINGTON - The US Defense Department has restricted military access to information leaked to the media by fugitive Edward Snowden, so as to protect classified documents, a Pentagon spokesman said Friday. "The Department of Defense is not blocking any websites," Lieutenant Colonel Damien Pickart told AFP, in response to a Guardian report.

I recently wrote in this space about the rise of the phrase “continuous monitoring” and the confusion it causes.  In a nutshell, federal organizations, facing FISMA mandates, have very clear guidance on the meaning of the phrase.  What they mean by it makes a ton of sense, but doesn’t match what many people outside the B

Anti-spam Test Director at Virus Bulletin, Martijn Grooten, joins Ryan Naraine on the podcast to talk about plans for the VB 2013 conference and emerging trends in th

A group of researchers at Duke University have created a new tool designed to keep malicious applications from stealing user passwords from smartphones running Google Android. Dubbed ScreenPass, the code runs as part of the phone's operating system and works as a crossing guard of sorts between local apps and remote servers.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Security researchers uncover critical flaws and widespread misconfigurations in Salesforce’s industry-specific CRM solutions.

Cloud Security

Artificial Intelligence

Maze and its investors are betting on finding profits in software that uses AI-powered agents to automate critical parts of the process.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.