Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

A coming White House Executive Order seeks to protect personal information by preventing the mass transfer of Americans’ sensitive data to countries of concern.

The API attack surface is expanding and API vulnerabilities are growing. AI will help attackers find and exploit API vulnerabilities at scale.

The US has restricted trade with Canadian company Sandvine for aiding the Egyptian government’s web monitoring operations.

Pharmaceutical solutions provider Cencora discloses a cyberattack that resulted in personal information being stolen from its systems.

The US government says Russia’s APT28 group compromised Ubiquiti EdgeRouters to run cyberespionage operations worldwide.

When evaluating XDR, consider its value based on its ability to reduce complexity and improve threat detection and response times.

Chinese threat actors target Ivanti VPN appliances with new malware designed to persist system upgrades.

Intel announces new and improved security features with the latest vPro platform and Core Ultra processors.

White House calls for the “timely, complete, and consistent” publication of CVE and CWE data to help solve the security metrics problem.

The Black Basta and Bl00dy ransomware gangs have started exploiting two vulnerabilities in ConnectWise ScreenConnect.

The US government makes a $45 million investment in 16 projects to improve cybersecurity across the energy sector.

8,800 domains, many once owned by major companies, have been abused to get millions of emails past spam filters as part of SubdoMailing campaign.

Quantum computers are coming, and will defeat current PKE encryption. But this cryptopocalypse is not dependent upon quantum computers — it could happen through other means, at any time.

U-Haul says customer information was compromised in a data breach involving a reservation tracking system.

The best Red Team engagements are a balanced mix of technology, tools and human operators.

Intel Core Ultra vPro security Intel Core Ultra vPro security

Intel announces new and improved security features with the latest vPro platform and Core Ultra processors.

NIST Cybersecurity Framework 2.0 NIST Cybersecurity Framework 2.0

NIST releases Cybersecurity Framework 2.0, the first major update since the creation of the CSF a decade ago.

AI in Cybersecurity AI in Cybersecurity

AI will allow attackers to improve their attacks, and defenders to improve their defense. Over time, little will change — but the battle will be more intense.

Top Cybersecurity Headlines

A coming White House Executive Order seeks to protect personal information by preventing the mass transfer of Americans’ sensitive data to countries of concern.

The API attack surface is expanding and API vulnerabilities are growing. AI will help attackers find and exploit API vulnerabilities at scale.

The US has restricted trade with Canadian company Sandvine for aiding the Egyptian government’s web monitoring operations.

Pharmaceutical solutions provider Cencora discloses a cyberattack that resulted in personal information being stolen from its systems.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Gain valuable insights from industry professionals who will help guide you through the intricacies of industrial cybersecurity.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 25-26, Ritz-Carlton, Half Moon Bay, CA]

Learn More

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects. [March 20, 2024]

Learn More

Designed for senior level cybersecurity leaders to discuss, share and learn innovative information security and risk management strategies, SecurityWeek’s CISO Forum, will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit dives into Threat hunting tools and frameworks, and explores the value of threat intelligence data in the defender’s security stack.

Learn More

Vulnerabilities

Cybercrime

Report Lists Top Applications With Security Vulnerabilities But Doesn't Provide a True Representation of Which are Really The Most DangerousA report released this week serves a wake-up call to users and companies, and shows the need to start paying more attention to what software is on (and what versions!) computers and other devices such as smartphones and removable storage devices.

Independent audit verifies that AWS meets detailed standards for security best practices and controls Amazon Web Services today announced it has achieved ISO 27001 certification for its AWS infrastructure, data centers and services, including Amazon Elastic Compute Cloud (Amazon EC2), Amazon Simple Storage Service (Amazon S3) and Amazon Virtual Private Cloud (Amazon VPC).

AT&T Offers Mobile Device Management Solution from MobileIron to Help Manage and Secure Mobile Devices in the WorkplaceAT&T today announced a new service to help businesses and organizations provide over-the-air protection and control for smartphones being used within an organization.

A report released today by Imperva, a provider of data security solutions, shares predictions on what we could expect to see in 2011 and is designed to inform and help IT security professionals defend their organization against the next onslaught of cyber security threats.Imperva's research team predicts IT security professionals will see the following in 2011:

A study released today shows that the financial services, technology and healthcare industries are seeing the greatest adoption of the iPad for business use.The report came from Good Technology, a provider of enterprise mobility solutions, which analyzed its customer base, which includes over 4,000 enterprise customers, whose iPad deployments range from one to over 1,000 iPads. "We took a close look at our customers who have deployed iPad devices so far," said John Herrema, senior vice president of corporate strategy at Good...

Community Information-Sharing Website to Advance Knowledge of Security Incidents via Anonymous ReportingVerizon has launched a Web site designed to collect and share information about security incidents that can be voluntarily and anonymously reported by participating organizations around the globe.

Will Oracle Acquire CSC?Will Larry Ellison pull out his wallet yet again to make another large acquisition? Does Oracle have CSC in its sights? Tips suggest that this may be the case and that Oracle is possibly looking to acquire services giant CSC.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

The API attack surface is expanding and API vulnerabilities are growing. AI will help attackers find and exploit API vulnerabilities at scale.