Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

In a signal move for the cybersecurity sector, identity and access management (IAM) vendor SailPoint has made its return to public markets.

The chief deputy attorney general of the agency sent an email on Wednesday that said nearly all of is computer systems were offline.

Former RNC official Sean Cairncross has been nominated for the post of National Cyber Director to streamline the US cybersecurity strategy.

In the latest edition of “Rising Tides” we talk with Lesley Carhart, Technical Director of Incident Response at Dragos.

Meta received close to 10,000 vulnerability reports and paid out over $2.3 million in bug bounty rewards in 2024.

Noteworthy stories that might have slipped under the radar: Google pays $10,000 bug bounty for YouTube vulnerability, Cybereason CEO sues two investors, Otorio launches new OT security tool.

The exploitation of a recent SonicWall vulnerability has started shortly after proof-of-concept (PoC) code was published.

China-linked APT Salt Typhoon has been exploiting known vulnerabilities in Cisco devices in attacks on telecom providers in the US and abroad.

ClearSky Cyber Security says it has seen a new Windows zero-day being exploited by a Chinese APT named Mustang Panda. 

Identity management provider SGNL has raised $30 million in a Series A funding round led by Brightmind Partners.

Attempts to exploit CVE-2024-0108, an authentication bypass vulnerability in Palo Alto firewalls, started one day after disclosure. 

People on the Move

The US arm of networking giant TP-Link has appointed Adam Robertson as Director of Information and Security.

Cyber exposure management firm Armis has promoted Alex Mosher to President.

Software giant Atlassian has named David Cross as its new CISO.

Dan Pagel has been named the new CEO of risk management and remediation firm Brinqa.

The City of Phoenix has promoted Mitch Kohlbecker to the role of Chief Information Security Officer.

More People On The Move
Windows vulnerability exploited Windows vulnerability exploited

ClearSky Cyber Security says it has seen a new Windows zero-day being exploited by a Chinese APT named Mustang Panda. 

zero-day flaw zero-day flaw

Rapid7 finds a new zero-day vulnerability in PostgreSQL and links it to chain of attacks against a BeyondTrust Remote Support product.

Cybersecurity M&A 2024 Cybersecurity M&A 2024

An analysis conducted by SecurityWeek shows that 405 cybersecurity-related mergers and acquisitions were announced in 2024.

Top Cybersecurity Headlines

A subgroup of the Russia-linked Seashell Blizzard is tasked with broad initial access operations to sustain long-term persistence.

The Microsoft Patch Tuesday machine hummed loudly this month with urgent fixes for a pair of already-exploited Windows zero-days.

Intel says roughly 100 of the 374 vulnerabilities it patched last year were firmware and hardware security defects.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Examine the state of cybersecurity in the context of quantum computing and artificial intelligence. Discuss the implications of the new White House administration’s cybersecurity policies and how they will influence the industry’s direction in 2025 and beyond.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Watch Now

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 2025, Stay Tuned]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.(February 26, 2025)

Learn More

Supply Chain Security Summit
Join us as we explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects. (March 19, 2025)

Learn More

Vulnerabilities

Cybercrime

Kaspersky Lab, the Moscow-based security and threat management software firm best known for its endpoint anti-virus solutions, on Monday announced that it has plans to develop a software-based solution to secure network traffic as part of the VMware Ready™ for Networking and Security Program.

SafeNet Protect V Delivers Data Control, Visibility and Governance for VMware & AWS Hosted Virtual Machines SafeNet, a Baltimore, Maryland-based provider of network security and data protection solutions, has launched “ProtectV”, a new encryption solution designed to address the security, control, and governance issues associated with data stored in the cloud.

How Can Today’s IT Managers Prepare and Recover From a Certificate Authority Breach?It is no secret that IT security breaches, data theft and attacks on the rise – consequently forcing IT managers to evolve their security foundations and turn to different technologies to protect the intellectual property of the data stores and data transmission systems they are charged with protecting.

Saudi Arabia-based Aramco was attacked earlier this month by malware that targeted some 30,000 workstations. According to the state-owned group which controls all of Saudi Arabia's oil production, things have been cleaned up in short time, and oil production itself was not impacted.

Security researchers from FireEye have discovered a new zero-day Java vulnerability that is being targeted in the wild. According to FireEye researcher Atif Mushtaq, the latest version of Java 7 is vulnerable, but some reports say Java 6 and earlier versions may not be vulnerable.

ROME - (AFP) - Italy's police said Saturday they have seized so far this year 52 million counterfeit items, including train tickets, smartphones, condoms and detergents, with much of them coming from China. The financial police's counter-fraud division said 97 members of organised criminal gangs, 41 percent of them Italian, were arrested during the same first seven months of 2012 in connection with the counterfeit goods.

On Thursday, law enforcement officials with the Criminal Investigation and Detection Group (CIDG) and the Presidential Anti-Organized Crime Commission (PAOCC) in the Philippines arrested more than 300 in a cybercrime sweep. The arrests took place in several subdivisions, and the operation is being hailed as the biggest cybercrime operation in the nation’s history.

Security researchers from Websense have discovered a new malware campaign targeting BlackBerry customers. The malicious emails say that the recipient has successfully created a Blackberry ID, and attempts to infect their system via a malicious attachment. "To enjoy the full benefits of your BlackBerry ID, please follow the instructions in the attached file," the email reads.

DARPA Opens the Door to ‘Plan X’ ProposalsIn June, SecurityWeek reported on a plan from the secretive Defense Advanced Research Projects Agency (DARPA), which will improve the government’s cyberwar capabilities. As expected, DARPA has said they will hold a meeting next month to solicit ideas.

NEW DELHI - (AFP) - India on Friday defended itself against accusations of heavy-handed online censorship, saying it had been successful in blocking content blamed for fuelling ethnic tensions.

SAN FRANCISCO - (AFP) - Microsoft on Thursday unveiled a new corporate logo for the first time in 25 years as the US tech giant geared up for a series of big product launches. It features a symbol made up of four separate colored squares -- reminiscent of the old Windows logo featuring wavy squares -- next to the name of the company. The previous logo was simply the italicized name.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

San Francisco application security startup raises $100 million in a Series D funding round led by Menlo Ventures. 

Cloud Security

Application Security

APIs are easy to develop, simple to implement, and frequently attacked. They are  prime and lucrative targets for cybercriminals. 

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.