CONFERENCE NOW LIVE: Threat Detection & Incident Response (TDIR) Summit - Join the Event In-Progress
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

In the end, cybersecurity isn’t just about collecting data. It’s about proving that your defenses actually work.

Despite massive investment, the explosion of sophisticated malware and deepfake attacks persists because organizations struggle to verify digital identities and establish fundamental trust.

Cisco published 10 security advisories detailing over a dozen vulnerabilities, including two high-severity flaws in its Identity Services Engine (ISE) and Unified Intelligence Center.

GitLab and Atlassian have released patches for over a dozen vulnerabilities in their products, including high-severity bugs.

Russian military intelligence hackers intensify targeting of Western logistics and technology companies moving supplies into Ukraine. 

Redmond’s threat hunters found 394,000 Windows systems talking to Lumma controllers, a victim pool that included global manufacturers. 

More than 100 AutomationDirect MB-Gateway devices may be vulnerable to attacks from the internet due to CVE-2025-36535.

SecurityWeek’s 2025 Threat Detection & Incident Response (TDIR) Summit takes place as a virtual summit on Wednesday, May 21st.

A mandatory filing to the Maine Attorney General says 69,461 customers nationwide were affected and dates the breach back to last December.

Matthew Lane allegedly hacked PowerSchool using stolen credentials and admitted to extorting a telecoms provider.

Wireless carrier Cellcom has confirmed that a week-long widespread service outage is the result of a cyberattack.

People on the Move

Jeremy Koppen has left Mandiant after 13 years to become the CISO of Equifax.

Engineering and technology solutions provider Amentum has appointed Max Shier as its CISO.

PAM provider Keeper Security has appointed Shane Barney as its Chief Information Security Officer.

SpecterOps has appointed Tim Bender as CFO, Pat Sheridan as CRO, and Bryce Hein as CMO.

CISA has officially announced the appointment of Madhu Gottumukkala as its new deputy director.

More People On The Move
ICS honeypot scanning ICS honeypot scanning

Many of the industrial control system (ICS) instances seen in internet scanning are likely or possibly honeypots, not real devices.

Pwn2Own Berlin 2025 results Pwn2Own Berlin 2025 results

Pwn2Own participants demonstrated exploits against VMs, AI, browsers, servers, containers, and operating systems.

NATO Locked Shields NATO Locked Shields

The 15th edition of NATO’s Locked Shields cyber defense exercise brought together 4,000 experts from 41 countries.

Top Cybersecurity Headlines

American steel giant Nucor on Wednesday disclosed a cybersecurity incident that bears the hallmarks of a ransomware attack.

The China-linked hacking group Earth Ammit has launched multi-wave attacks in Taiwan and South Korea to disrupt the drone sector.

Google bundles multiple safeguards under a single Android toggle to protect high-risk users from advanced mobile malware implants.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Join this webinar for a fascinating discussion to understand why data in itself is not enough to make informed decisions for prioritization.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

If 2012 has shown us anything about the security landscape, it’s that we’ve come very far in defending against – and deterring – attacks. And we’ve also learned that while we cannot control attackers themselves, we have endless power in our preparation for, and responses to, their attacks. With all of the new security technology and services available, we have the tools we need to raise the defensibility of every layer of our security shields.

SAN JUAN, PUERTO RICO – So long as wireless carriers and phone manufacturers drag their feet on regular operating system updates, Android users will remain vulnerable to malware and other attacks, a technologist and policy analyst said Monday.

MANILA, Feb 5, 2013 (AFP) - The Philippine Supreme Court has again stopped the government from enforcing a controversial cybercrime law, officials said Tuesday, amid concern it would severely curb Internet freedoms. Justice Secretary Leila de Lima said a fresh "temporary restraining order" (TRO) issued by the Supreme Court meant the law passed last year could not take effect.

Despite the fact that a majority of IT respondents say that their cloud deployments were successful, and have saved their respective organization's money, many still do not trust the cloud with sensitive or personal information. Moreover, some fear storing their data in the cloud due to concerns over government or legal action.

After suffering a breach last week that impacted some 250,000 accounts, Twitter is looking to bolster security by investing in two-factor authentication. The news comes by way of a job posting, where the micro-blogging site has asked security developers to come forward.

A document containing business data, including some personal details, from several regional U.S. financial firms was leaked by Anonymous earlier this week. On Tuesday, the Federal Reserve confirmed that one of their systems was breached, but would not directly link the breach to the data released by Anonymous’ OpLastResort.

SpeedTest.net, a free service that tests the performance of Broadband connections, was compromised and made to serve malware, according to security vendor Invincea. The situation has since been cleaned up. Details and pictures can be found here on Invincea's blog.

Google blacklisted the domain of netseer.com in response to a malware attack on the site, triggering a chain reaction that led to a number of high-traffic websites being flagged. This included sites such as ZDNet and The Guardian UK. According to NetSeer, the situation was resolved as of 9:30 a.m. PT.  The situation began when netseer.com was hacked and infected with malware. After the hack, Google added the domain to its list of sites affected by malware, and Chrome and...

Web security firm WhiteHat Security on Tuesday announced that it landed a $31 million round of funding led by JMI Equity, with additional investment from previous investor, Investor Growth Capital (IGC).

Ending weeks of rumors and speculation, Dell Inc. today said that it would be going private in a $24.4 billion deal that would put the company in the hands of founder and CEO Michael Dell and private equity firm Silver Lake.

WASHINGTON - The US Department of Energy on Monday confirmed it was the target of a cyber attack in January, which stole employee and contractor data, but said no classified data was compromised.

Two researchers have uncovered a new vulnerability in the Transport Layer Security (TLS) and Datagram TLS (DTLS) protocols that allow attackers to recover plaintext from a TLS/DTLS connection when CBC-mode encryption is used.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Code quality and security firm CodeAnt has secured $2 million in seed funding and it has been valued at $20 million.

Cloud Security

Cloud Security

VMware patches flaws that expose users to data leakage, command execution and denial-of-service attacks. No temporary workarounds available. 

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.