Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Noteworthy stories that might have slipped under the radar: Capital One hacker’s sentence reversed, Google patches critical Chrome vulnerability, the story of an Expat flaw. 

The Cloak ransomware group has claimed responsibility for a February cyberattack on Virginia Attorney General’s Office.

Join the virtual event as we explore of the critical nature of software and vendor supply chain security issues.

Cato Networks discovers a new LLM jailbreak technique that relies on creating a fictional world to bypass a model’s security controls.

The FishMonger APT group, a subdivision of Chinese cybersecurity firm I-Soon, compromised seven organizations in a 2022 campaign.

Industry professionals comment on Google acquiring cloud security giant Wiz for $32 billion in cash.

The Hellcat ransomware group claims to have stolen tens of gigabytes of data from Ascom and Jaguar Land Rover.

Former NFL and University of Michigan assistant football coach Matt Weiss hacked into the computer accounts of thousands of college athletes seeking intimate photos and videos.

More details have come to light on the recent supply chain attack targeting GitHub Actions, including its root cause.

Analysis reveals a 140% increase in browser phishing, including a 130% increase in zero-hour phishing attacks.

Real-time event and risk detection firm Dataminr has raised $85 million from NightDragon and HSBC to accelerate AI development.

People on the Move

Life360 has appointed Vari Bindra, former Amazon cybersecurity lead, as Chief Information Security Officer.

Forcepoint has appointed Guy Shamilov as CISO, Bakshi Kohli as CTO and Naveen Palavalli as CPO and CMO.

Paul Calatayud has been named CISO of developer security posture management firm Archipelo.

Cyber readiness and response firm Sygnia has appointed Avi Golan as its new CEO.

Cybersecurity firm Absolute Security announced Harold Rivas as its new CISO.

More People On The Move
GitHub supply chain attack GitHub supply chain attack

More details have come to light on the recent supply chain attack targeting GitHub Actions, including its root cause.

WhatsApp Exploits WhatsApp Exploits

Attacks involving Paragon’s Graphite spyware involved a WhatsApp zero-day that could be exploited without any user interaction.

Google acquires Wiz Google acquires Wiz

News analysis: Google positions itself to compete with Microsoft for enterprise security dollars. How does this deal affect startup ecosystem?

Top Cybersecurity Headlines

A long-running campaign phishing for credentials through scareware recently switched to targeting macOS users.

Google has confirmed reports that it’s buying cloud security giant Wiz and says it’s prepared to pay $32 billion in cash.

A year-old vulnerability in a third-party ChatGPT tool is being exploited against financial entities and US government organizations.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

This webinar will guide you in aligning your security testing strategy with the right tools, helping you move beyond identifying weaknesses to effectively validating your overall security posture.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

This event delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Learn More

Supply Chain Security Summit
Join us as we explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects. (March 19, 2025)

Learn More

Vulnerabilities

Cybercrime

Less than two years after being aquired by Intel, McAfee said that it will be laying off a "small percentage" of the now-security division's roughly 7,100 employees, according to a report that was confirmed with SecurityWeek on Thursday.

HyTrust 3.0 Integrates ‘Secondary Approval’ Feature To Safeguard Against Operational Downtime and Internal Security Breaches.At the RSA Europe Conference in London this week, HyTrust, a provider of policy management and access control solutions for virtual environments, released version 3.0 of its HyTrust Appliance.

If you and your co-workers are looking forward to Friday, you are not alone – phishers are looking forward to it as well. In an analysis of phishing schemes between July and August, researchers at Websense found that 38.5 percent of the phishing attacks they detected were conducted on Friday, with Monday (30 percent) and Sunday (10.9 percent) coming in at second and third, respectively. 

SHANGHAI - Chinese telecom firm ZTE, accused by American lawmakers of doing business with Iran and posing a security threat, says US network giant Cisco Systems has ended a cooperation deal with it.

OTTAWA - Canada said Tuesday it had invoked a "national security exception" that could exclude China's Huawei Technologies from a role in helping build its new super secure government network.

WASHINGTON - The US Supreme Court let stand Tuesday an immunity law on wiretapping viewed by government as a useful anti-terror tool but criticized by rights activists as a flagrant abuse of executive power. The top US court declined to review a December 2011 appeals court decision that rejected a lawsuit against AT&T for helping the National Security Agency monitor its customers' phone calls and Internet traffic.

The growth of software activation key generators is linked to the spread of malware, according to findings from Microsoft's latest Security Intelligence report. In volume 13 of the report, which was released Monday, Microsoft reported that Win32/Keygen was the most commonly reported threat family in the first half of 2012. Win32/Keygen, which represents software activation key generators, was detected nearly five million times.

A Russian cyber-criminal going by the handle vorVzakone may be behind the plan to launch a series of Trojan attacks against financial institutions, Brian Krebs, the security researcher and reporter behind KrebsonSecurity.com, wrote Monday. Krebs identified the supposed mastermind based on a message posted on "exclusive Underweb forums," he wrote.

BEIJING - Chinese telecom firm Huawei's ambitions to become a global brand rivalling Apple and Samsung have been hit by a US report claiming that the company, founded by a former Chinese soldier, posed an espionage threat.

At RSA Conference Europe 2012 in London, RSA, The Security Division of EMC, on Tuesday introduced “Distributed Credential Protection,” new authentication technology designed to protect passwords and other credentials stored in databases from cyber attacks. RSA Distributed Credential Protection (DCP) allows customers to split authentication credentials between two points, providing a bump in protection to an often-targeted access point.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Google has integrated OSV-SCALIBR features into OSV-Scanner, its free vulnerability scanner for open source developers.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.