Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Redmond’s AI Red Team says human involvement remains irreplaceable in addressing nuanced risks.

A fake proof-of-concept (PoC) exploit for a recent LDAP vulnerability distributes information stealer malware.

The US Justice Department has announced charges against three Russians for operating the Blender and Sinbad cryptocurrency mixers.

Developed with the help of AI, the emerging FunkSec ransomware claimed over 80 victims in December 2024.

Juniper Networks has patched multiple high-severity vulnerabilities in Junos OS and its third-party components.

Chinese cyberspies targeted offices dealing with foreign investments and sanctions in the recent US Treasury hack. 

If the deal is sealed, SpaceX would provide encryption services for the Italian government and communications infrastructure for the military and emergency services.

Noteworthy stories that might have slipped under the radar: 2025 trucking cybersecurity report, Bank of America discloses data breach, Silk Typhoon behind US Treasury hack.

The latest version of the Banshee macOS information stealer no longer checks if the infected systems have the Russian language installed.

Substance abuse treatment provider BayMark Health Services says patient personal information was compromised in a data breach.

Fortinet warns of a phishing campaign that uses legitimate links to take over the victims’ PayPal accounts.

People on the Move

Cloud security giant Wiz has named Fazal Merchant as President and Chief Financial Officer.

Cybersecurity and data protection company Acronis has appointed Gerald Beuchelt as CISO.

Adam Zoller has joined CrowdStrike as Chief Information Security Officer.

Ekta Singh-Bushell is the first COO of industrial cybersecurity company Dragos.

Threat intelligence firm Flashpoint has appointed David Lemon as President.

More People On The Move
Treasury Hacked by China Treasury Hacked by China

Chinese cyberspies targeted offices dealing with foreign investments and sanctions in the recent US Treasury hack. 

Streaming platform DRM hacking Streaming platform DRM hacking

A research project into vulnerabilities affecting Microsoft’s PlayReady DRM raises some questions on responsible disclosure.

Ivanti vulnerability exploited Ivanti vulnerability exploited

Google Cloud’s Mandiant has linked the exploitation of CVE-2025-0282, a new Ivanti VPN zero-day, to Chinese cyberspies.

Top Cybersecurity Headlines

Ivanti confirms zero-day exploitation of a remotely exploitable code execution flaw in its Connect Security product line.

After its CEO was arrested last summer, Telegram has been increasingly sharing user data at the request of authorities.

The insider threat problem will worsen, and the solutions will widen, in the age of generative-AI.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Explore trends and technologies that will shape the future of cybersecurity. Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 2025, Stay Tuned]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.(February 26, 2025)

Learn More

Supply Chain Security Summit
Join us as we explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects. (March 19, 2025)

Learn More

Vulnerabilities

Cybercrime

The malware responsible for attacks on at least 30 local governments, universities, and businesses in the Netherlands, Dorifel (XDocCrypt), is still actively spreading and causing new infections, despite a wide net of detection within the anti-Virus market.

IT security and data protection company, Sophos, on Monday launched Sophos Mobile Control 2.5, the latest version of its offering in the increasingly competitive mobile device management (MDM) space. The latest update brings an updated web-based admin console and new features designed to provide IT administrators with a simple way to offer BYOD in the enterprise.

Last week, an Anon looking for lulz blasted a message into several rooms at once, most of those who seen the message laughed and moved on with their day. However, someone didn’t, and instead a news story appeared that – if anything – proves that the name Anonymous can be used to give even the most outlandish claims a spotlight.

New York City Mayor, Michael Bloomberg, alongside Police Commissioner Ray Kelly, announced a partnership between the city and Microsoft last week, which led to the development of crime prevention technologies that can also help where counterterrorism efforts are concerned. The system, which is said to cost between $30 and $40 million to develop, will be available to any law enforcement agency, and the City of New York will take a 30% cut of any future sale.

NEW YORK - (AFP) - Internet giant Google on Monday said it plans to lay off about 4,000 employees at cellphone maker Motorola Mobility, as it seeks to focus on sales of its Android devices.About two-thirds of the layoffs will come from outside the United States, and some 30 of Motorola Mobility's 90 global facilities will be shut, Google said.The aim of the cuts is to simplify the Motorola line of mobile phones "from feature phones to more innovative and...

If Your Organization Has Information That is Valuable Enough to Keep Private, Then There is Value For An Attacker in Stealing It...

Towards the end of July, anti-Malware vendor Intego broke the story of Crisis, the name given to a Trojan that targets Mac OS X. On Friday, ThreatMetrix, a provider of technologies that help organizations combat fraud and malware, published a report that breaks the code down, and examines the internals of the latest so-called threat targeting Mac users.

PARIS - (AFP) - The battle for Syria is raging on the ground but also on social media, where people on both sides of the conflict are hacking, posting and spamming in a frenzied propaganda war.The Twitter feeds of news organizations have been hacked by pro-regime elements, videos purporting to show atrocities in Syria are regularly posted to YouTube and pro- or anti-government messages often flood Facebook pages.

SAN FRANCISCO - (AFP) - Facebook will submit to external audits of how well it guards users' data under the terms of a settlement finalized Friday with US authorities concerned about privacy abuses.

Project leverages popular search engines to identify vulnerable systems and sensitive data in corporate networks.Information is the key; hackers on both side of the law know this. Thus the tools recently released by security consulting firm Stach & Liu, and the DEF CON presentation given by Francis Brown and Rob Ragan, offer InfoSec teams a chance to win the information race.

At the Black Hat conference last month, PhishMe, a company that teaches security awareness to help users identify Phishing and targeted attacks, spoke to 250 security professionals and asked them for basic information on how their organizations deals with, or is impacted by, Phishing attacks. As it turns out, it’s a common issue, and most of the basics steps are doing little to lessen the blow.

Anonymous Hits Australian Security Intelligence Organisation With DDoS Attacks in #OpAustraliaSYDNEY - (AFP) - Anonymous on Friday claimed to have shut down a computer server belonging to Australia's domestic spy agency ASIO, reportedly briefly closing down access to its public webpage.The Australian Security Intelligence Organisation (ASIO) acknowledged some disruption to its website.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Cloud Security

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.