Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Google is invoking the ‘monoculture’ word in response to a scathing U.S. government report on Microsoft’s inadequate cybersecurity practices.

Linguistic Lumberjack (CVE-2024-4323) is a critical vulnerability in the Fluent Bit logging utility that can allow DoS, information disclosure and possibly RCE.

CyberArk agreed to acquire machine identity management Venafi from Thoma Bravo for $1.54 billion.

CISA executive assistant director for cybersecurity Eric Goldstein is leaving the agency after more than three years.

Health insurance firm WebTPA says the personal information of 2.4 million individuals was compromised in a data breach.

Roundup of the cybersecurity-related merger and acquisition (M&A) deals announced in the first half of May 2024.

These strategies can help cybersecurity startups navigate the current market dynamics, focusing on modern buyer behavior, updated KPIs, brand awareness, and effective sales and marketing alignment.

MediSecure says data related to prescriptions distributed until November 2023 was compromised in a ransomware attack.

The American Radio Relay League (ARRL) has been targeted in a cyberattack that resulted in disruption and possibly a data breach.

Jan Leike, who ran OpenAI’s “Super Alignment” team, believes there should be more focus on preparing for the next generation of AI models, including on things like safety.

Slack reveals it has been training AI/ML models on customer data, including messages, files and usage information. It’s opt-in by default.

People on the Move

Joe Levy has been appointed Sophos’ permanent CEO, and Jim Dildine has been named the company’s CFO.

CISA executive assistant director for cybersecurity Eric Goldstein is leaving the agency after more than three years.

OT zero trust access and control company Dispel has appointed Dean Macris as its CISO.

Cloud identity and security solutions firm Saviynt has hired former Gartner Analyst Henrique Teixeira as Senior Vice President of Strategy.

PR and marketing firm FleishmanHillard named Scott Radcliffe as the agency’s global director of cybersecurity.

More People On The Move
Google Cloud AI Features Google Cloud AI Features

Google is invoking the ‘monoculture’ word in response to a scathing U.S. government report on Microsoft’s inadequate cybersecurity practices.

Slack data for AI Slack data for AI

Slack reveals it has been training AI/ML models on customer data, including messages, files and usage information. It’s opt-in by default.

Microsoft Quick Assist Tool Abused for Ransomware Delivery

The Black Basta group abuses remote connection tool Quick Assist in vishing attacks leading to ransomware deployment.

Top Cybersecurity Headlines

Google is invoking the ‘monoculture’ word in response to a scathing U.S. government report on Microsoft’s inadequate cybersecurity practices.

Linguistic Lumberjack (CVE-2024-4323) is a critical vulnerability in the Fluent Bit logging utility that can allow DoS, information disclosure and possibly RCE.

CyberArk agreed to acquire machine identity management Venafi from Thoma Bravo for $1.54 billion.

CISA executive assistant director for cybersecurity Eric Goldstein is leaving the agency after more than three years.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 25-26, Ritz-Carlton, Half Moon Bay, CA]

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Learn More

Designed for senior level cybersecurity leaders to discuss, share and learn innovative information security and risk management strategies, SecurityWeek’s CISO Forum, will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit dives into Threat hunting tools and frameworks, and explores the value of threat intelligence data in the defender’s security stack.

Learn More

Vulnerabilities

Cybercrime

AVG Technologies, the recently gone public provider of Internet security and utility software, this week launched a feature designed to help provide customers with increased privacy during their online activities.

Shawn Henry, the executive assistant director of the FBI’s Criminal, Cyber, Response, and Services Branch, told the Wall Street Journal that the government and private sector is outgunned, when it comes to the defending data and networks from cyber criminals.Henry told the Journal that he didn’t see anyway to come out of the current situation ahead, unless companies were willing to make major changes to their consistently vulnerable networks. 

Starting in May, eCommerce merchants will have a new tool at their disposal to help fight fraud in online transactions in real time, thanks to a new offering from MasterCard. The company today introduced “Expert Monitoring Fraud Scoring for Merchants,” a new that tool enhances merchants’ insight into card behavior beyond a website or a cardholder’s shopping cart.

In 2008, the Taidoor Trojan made its first appearance on the Web. It started by attacking government agencies, but the group behind it expanded their reach by targeting a wide range of victims. Now, based on research from Symantec, it appears that the group running Taidoor is interested in think tanks, especially those that are focused on Taiwan.

Web Application Firewalls: What Approach Should You Take To Evaluate WAF Solutions? In my previous column, I focused on various features you should check out when choosing a Web application firewall. Together, these features help improve the accuracy of a WAF.

While the Chinese-owned network vendor Huawei moves to soften its image in Australia, reports say that concerns over the company’s government ties led it to being banned from bidding on a contract to work on Australia’s National Broadband Network (NBN). As word of Australia’s block spread, lawmakers in New Zealand questioned the safety of their own network, and called for an investigation.

The Department of Energy (DOE), Department of Justice (DOJ), and the Department of Homeland Security (DHS) need to tighten procedures and controls when it comes to mitigating IT supply chain issues, a recently published GAO report says. The Department of Defense was the only agency to make any progress on the issue.

Wave Systems Gets U.S. Army Contract for Encryption Management for Vehicle-Based Mobile Computers Wave Systems, a Massachusetts-based provider of security, data protection, and encryption solutions, today announced that it has received a contract from the United States Army to provide labor, equipment and management to implement solutions for the Army's self-encrypting drives (SEDs).

Privacy advocates are largely giving the thumbs up to a report from the Federal Trade Commission (FTC) calling for Congress to enact privacy, data security and breach notification laws.The report, entitled “Protecting Consumer Privacy in an Era of Rapid Change: Recommendations For Businesses and Policymakers,” also lays out best practices for businesses for protecting the privacy of American consumers. Building upon a report from December 2010, the updated report calls on corporations to enact the following recommendations:

Good Technology, a provider of mobile device security and management solutions for enterprises, today launched a secure browser for Android devices designed to provide secure access to enterprise resources via mobile devices.Dubbed Good Mobile Access (GMA) for Android, the Web browser is a feature of the company’s flagship Good for Enterprise offering, and enables secure mobile access to “behind-the-firewall applications”, company databases, resources and collaboration tools such as SharePoint data without needing a VPN connection.

They say history repeats itself, or perhaps this is the story of a community recovering from a catastrophe. Either way, the underground is returning to its former glory, and not just in how much business is being conducted – but how it is conducted. In 2006, the English-speaking part of the underground economy was a prosperous community, with several mega-bulletin boards competing for the business and the heart of fraudsters from all over the world.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

A critical vulnerability tracked as CVE-2024-34359 and dubbed Llama Drama can allow hackers to target AI product developers.

Cloud Security

Cloud Security

Google is invoking the 'monoculture' word in response to a scathing U.S. government report on Microsoft's inadequate cybersecurity practices.