Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Redmond’s AI Red Team says human involvement remains irreplaceable in addressing nuanced risks.

A fake proof-of-concept (PoC) exploit for a recent LDAP vulnerability distributes information stealer malware.

The US Justice Department has announced charges against three Russians for operating the Blender and Sinbad cryptocurrency mixers.

Developed with the help of AI, the emerging FunkSec ransomware claimed over 80 victims in December 2024.

Juniper Networks has patched multiple high-severity vulnerabilities in Junos OS and its third-party components.

Chinese cyberspies targeted offices dealing with foreign investments and sanctions in the recent US Treasury hack. 

If the deal is sealed, SpaceX would provide encryption services for the Italian government and communications infrastructure for the military and emergency services.

Noteworthy stories that might have slipped under the radar: 2025 trucking cybersecurity report, Bank of America discloses data breach, Silk Typhoon behind US Treasury hack.

The latest version of the Banshee macOS information stealer no longer checks if the infected systems have the Russian language installed.

Substance abuse treatment provider BayMark Health Services says patient personal information was compromised in a data breach.

Fortinet warns of a phishing campaign that uses legitimate links to take over the victims’ PayPal accounts.

People on the Move

Cloud security giant Wiz has named Fazal Merchant as President and Chief Financial Officer.

Cybersecurity and data protection company Acronis has appointed Gerald Beuchelt as CISO.

Adam Zoller has joined CrowdStrike as Chief Information Security Officer.

Ekta Singh-Bushell is the first COO of industrial cybersecurity company Dragos.

Threat intelligence firm Flashpoint has appointed David Lemon as President.

More People On The Move
Treasury Hacked by China Treasury Hacked by China

Chinese cyberspies targeted offices dealing with foreign investments and sanctions in the recent US Treasury hack. 

Streaming platform DRM hacking Streaming platform DRM hacking

A research project into vulnerabilities affecting Microsoft’s PlayReady DRM raises some questions on responsible disclosure.

Ivanti vulnerability exploited Ivanti vulnerability exploited

Google Cloud’s Mandiant has linked the exploitation of CVE-2025-0282, a new Ivanti VPN zero-day, to Chinese cyberspies.

Top Cybersecurity Headlines

Ivanti confirms zero-day exploitation of a remotely exploitable code execution flaw in its Connect Security product line.

After its CEO was arrested last summer, Telegram has been increasingly sharing user data at the request of authorities.

The insider threat problem will worsen, and the solutions will widen, in the age of generative-AI.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Explore trends and technologies that will shape the future of cybersecurity. Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 2025, Stay Tuned]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.(February 26, 2025)

Learn More

Supply Chain Security Summit
Join us as we explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects. (March 19, 2025)

Learn More

Vulnerabilities

Cybercrime

One of the central figures believed to have been behind the Mariposa botnet is on trial in Slovenia. The suspected mastermind of the botnet, Matjaž Škorjanc, 26, is believed by the authorities to be the hacker known as "Iserdo." Authorities arrested him in Slovenia arrested in 2010. At its height, Mariposa was composed of more than 8 million zombie computers infected with the Butterfly bot (Mariposa is Spanish for butterfly). 

Enigma Module Offers Full Disk Encryption for USB Storage DrivesEnova Technology, a Taiwan-based provider of encryption solutions, on Monday launched a USB encryption solution designed to provide consumers and enterprises with real-time full disk encryption for just about any USB mass storage class drive.

In the physical world, some metropolitan areas manage growth by creating boundaries. In the online world, growth is also controlled with boundaries. And right now, we’re in the middle of setting the course for how the real estate of the Internet will be labeled and accessed for years to come with the Internet Corporation for Assigned Names and Numbers (ICANN) new gTLD Program.

McAfee announced on Tuesday that it has been awarded a multi-year Enterprise Level Agreement contract from the Department of Homeland Security (DHS) that could be valued up to $12 million. Under the contract, McAfee says it plans to provide the DHS with a number of of enterprise wide network and system security products, services and support, including expanding the DHS’s continuous monitoring and security capabilities.

WELLINGTON - (AFP) - Megaupload boss Kim Dotcom on Tuesday accused New Zealand police of kicking and punching him when they raided his Auckland mansion earlier this year to arrest him for alleged copyright piracy.Dotcom told the Auckland High Court he tried to surrender peacefully to police during the raid in January, when about 70 armed police cooperating with a major US online piracy probe raided the mansion.

SEOUL- (AFP) - South Korea's Samsung Electronics said Tuesday it had launched a super-size version of its Galaxy Note smartphone, the latest salvo in its battle with Apple for the multi-billion-dollar handheld market.The Galaxy Note 10.1, which went on sale on Monday in Germany and the United Arab Emirates, is almost twice as wide as its predecessor and nearly the size of a tablet.

Ever wonder how some Twitter accounts seemingly became so popular overnight? According to Barracuda Networks, it is not always due to the person's celebrity or charisma, but instead is tied to a thriving black market for phony social networking accounts.

Apple’s tech support department is taking some heat after their actions led to a journalist losing control of all of the data associated with his iCloud account, which in turn led to the compromise of Gizmodo’s Twitter account over the weekend.

On Friday, Reuters reported that its blogging platform was compromised and used to post false news stories. As it turned out, not only was the publishing platform targeted, but Reuters’ Twitter accounts were as well.

Would you, could you, protect my data? Protect it now, protect it then, please protect it everywhen. Protect my health and banking stuff, though it can be, will be rough.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Cloud Security

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.