Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

AI-powered threat prevention company Augur (rebranded from SecLytics) has raised $7 million in seed funding.

Combined with AI, polymorphic phishing emails have become highly sophisticated, creating more personalized and evasive messages that result in higher attack success rates.

The FBI received roughly 860,000 complaints of malicious activity in 2024, with reported losses exceeding $16.6 billion.

Blue Shield of California says a website misconfiguration exposed the health information of its members to Google.

Cisco is investigating the impact of the Erlang/OTP remote code execution vulnerability CVE-2025-32433 on its products.

Yale New Haven Health System recently discovered that the personal information of millions of patients was stolen from its systems.

Identity protection startup AuthMind has announced raising $19.3 million in a seed funding round led by Cheyenne Ventures.

Desired Effect provides an ethical vulnerability exchange marketplace to help defenders get ahead of attackers.

Endor Labs has raised $93 million in a Series B funding round and announced a major expansion of its AppSec platform.

The cash infusion brings Chainguard’s total funding to about $612 million since launching in 2021 and prices the company at $3.5 billion.

A security researcher has discovered hundreds of leaked secrets by restoring files deleted from GitHub repositories.

People on the Move

Raffi Joukhadarian has been named Managing Director and Chief Financial Officer at MorganFranklin Cyber.

Data security firm Rubrik has appointed Kavitha Mariappan as its Chief Transformation Officer.

DARPA veteran Dan Kaufman has joined Badge as SVP, AI and Cybersecurity.

Kelly Shortridge has been promoted to VP of Security Products at Fastly.

After the passing of Amit Yoran, Tenable has appointed Steve Vintz and Mark Thurmond as co-CEOs.

More People On The Move
Healthcare data breach Healthcare data breach

Yale New Haven Health System recently discovered that the personal information of millions of patients was stolen from its systems.

Marks&Spencer cyberattack Marks&Spencer cyberattack

British retailer Marks & Spencer has been experiencing certain service disruptions after falling victim to a cyberattack.

SK Telecom cyberattack SK Telecom cyberattack

SK Telecom, South Korea’s largest telecom company, disclosed a data leak involving a malware infection.

Top Cybersecurity Headlines

Microsoft security chief Charlie Bell says the SFI’s 28 objectives are “near completion” and that 11 others have made “significant progress.”

With unapproved AI tools entrenched in daily workflows, experts say it’s time to shift from monitoring to managing Shadow AI use across the enterprise.

A Windows NTLM vulnerability patched in March has been exploited in attacks targeting government and private institutions.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

This webinar will guide you in aligning your security testing strategy with the right tools, helping you move beyond identifying weaknesses to effectively validating your overall security posture.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

Researchers from the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI), released their 2013 cyber-threat forecast on Wednesday. The report examines what they think will be the most serious issues online in the next twelve months. The face of cybersecurity has changed over the last year, the report says, as attackers have aligned with national agendas, and taken aim at businesses and governments alike.

WASHINGTON - A US commission on Wednesday urged lawmakers to consider tighter rules on investment by Chinese state-owned firms, warning that they may pose economic as well as security risks. In an annual report to Congress, the US-China Economic and Security Review Commission also called for efforts to bring China into arms reduction talks due to Beijing's growing expenditure on opaque weapons programs.

BELIZE CITY - Prime Minister Dean Barrow on Wednesday urged anti-virus software pioneer John McAfee, wanted for questioning in the murder of a neighbor, to turn himself in to Belizean authorities. McAfee, 67, told CNBC television Tuesday that he was moving every four hours to avoid police who want to question him about the murder of fellow American Gregory Faull, a Florida native who was found dead at his home in a pool of blood.

Adobe Confirms Breach on Connectusers.com –  Site Taken OfflineAdobe has confirmed claims made by an Egyptian hacker that a database behind Connectusers.com was breached. The company is still investigating, but cached copies of the forum’s source code show a possible explanation as to the cause – outdated forum software.

Tibetan activists are being targeted by a new variant of the Imuler (Revir) Trojan that was originally discovered in September. The attack is launched via email, and uses images of other pro-Tibetan groups as bait in order to encourage the victim into opening files.

LAS VEGAS - Visibility was a commonly heard word at Palo Alto Networks' Ignite conference this week in Las Vegas as customers described the requirements of their network and what they need to enable users to deploy the applications they want without compromising security.

WASHINGTON - The investigation that toppled CIA chief David Petraeus has sparked fresh debate over online privacy and the government's ability to snoop into private email accounts. "When the CIA director cannot hide his activities online, what hope is there for the rest of us?" said Chris Soghoian of the American Civil Liberties Union's Privacy and Technology Project

Just when you start getting comfortable thinking that DDoS or SQL injections are the attack methods that deserve your heavyweight protective measures, another type of vulnerability rears its ugly head larger and louder. Recently it's been cross-site attacks that are on the rise and warrant close scrutiny.

Vormetric, a provider of enterprise encryption and key management solutions, today announced that Alan Kessler has been appointed as the company’s new President and CEO. Kessler comes to Vormetric from HP where he was VP of Worldwide Sales and Service for Enterprise Security Products, and responsible for HP ArcSight, HP TippingPoint, HP Fortify, HP Application Security Center and HP Atalla product lines.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Endor Labs has raised $93 million in a Series B funding round and announced a major expansion of its AppSec platform.

Cloud Security

Cloud Security

The greatest security policies in the world are useless if enterprises don’t have a reasonable, consistent, and reliable way to implement them.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.