Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Cisco Duo warns that breach exposed phone numbers, phone carriers, metadata and other logs that could lead to downstream social engineering attacks.

NightVision, an early stage startup in the application security testing space, has raised $5.4 million in seed funding.

The Dark Angels (Dunghill) ransomware group claims to have stolen 1 Tb of data from Nexperia, which is investigating the incident.

Juniper Networks patches dozens of vulnerabilities in Junos OS, Junos OS Evolved, and other products.

ICS malware Fuxnet allegedly used by Ukrainian Blackjack group to disrupt industrial sensors and other systems belonging to a Moscow infrastructure firm.

Authorities in Australia and the US have arrested and charged two individuals for developing and selling the Hive RAT.

Former security engineer Shakeeb Ahmed was sentenced to prison for hacking and defrauding cryptocurrency exchanges.

Palo Alto Networks has started releasing hotfixes for the firewall zero-day CVE-2024-3400, which some have linked to North Korea’s Lazarus. 

The bill was approved on a bipartisan basis, 273-147, though it will still have to clear the Senate to become law.

A state-sponsored threat actor has been exploiting a zero-day in Palo Alto Networks firewalls for the past two weeks.

Financial terms of the translation were not disclosed but reports out of Tel Aviv valued the deal in the range of $350 million.

People on the Move

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

Former DoD CISO Jack Wilmer has been named CEO of defensive and offensive cyber solutions provider SIXGEN.

Certificate lifecycle management firm Sectigo has hired Jason Scott as its CISO.

The State of Vermont has appointed John Toney as the state’s new CISO.

More People On The Move
Palo Alto Networks Palo Alto Networks

Palo Alto Networks has started releasing hotfixes for the firewall zero-day CVE-2024-3400, which some have linked to North Korea’s Lazarus. 

Microsoft breach Microsoft breach

The US government says Midnight Blizzard’s compromise of Microsoft corporate email accounts “presents a grave and unacceptable risk to federal agencies.”

How AWS disrupts DDoS attacks and is tackling IP Spoofing at the source How AWS disrupts DDoS attacks and is tackling IP Spoofing at the source

SecurityWeek speaks to Tom Scholl, VP and distinguished engineer at AWS, on how the organization tackles IP Spoofing and DDoS attacks.

Top Cybersecurity Headlines

Cisco Duo warns that breach exposed phone numbers, phone carriers, metadata and other logs that could lead to downstream social engineering attacks.

NightVision, an early stage startup in the application security testing space, has raised $5.4 million in seed funding.

The Dark Angels (Dunghill) ransomware group claims to have stolen 1 Tb of data from Nexperia, which is investigating the incident.

Juniper Networks patches dozens of vulnerabilities in Junos OS, Junos OS Evolved, and other products.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 25-26, Ritz-Carlton, Half Moon Bay, CA]

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Learn More

Designed for senior level cybersecurity leaders to discuss, share and learn innovative information security and risk management strategies, SecurityWeek’s CISO Forum, will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit dives into Threat hunting tools and frameworks, and explores the value of threat intelligence data in the defender’s security stack.

Learn More

Vulnerabilities

Cybercrime

According to the joint FBI/National White Collar Crime Center’s Internet Crime Complaint Center (IC3) just-released 2010 Internet Crime Report, non-delivery of payment or merchandise, scams impersonating the FBI, and identity theft were the top three most common complaints received in 2010. The report also includes a state-by-state breakdown of complaints.

Corporate use of telecommuters is on the rise. Office space is expensive. Some companies use telecommuting as a way of reducing office space, while others like the fact that a telecommuting workforce gives them more geographic flexibility when hiring. If you can reasonably manage one person in Cleveland, who is the perfect skill match for the job, why try to hire a more expensive, less skilled person Chicago headquarters? Some companies work with telecommuters for the simple reason that employees...

Dmitry M. Naskovets of Belarus, creator and operator of CallService.biz, an online business that assisted over 2,000 identity thieves in over 5,000 instances of fraud—pled guilty to charges of conspiracy to commit wire and credit card fraud. Through Callservice.biz, Naskovets helped fellow online thieves use stolen information by providing English language calling services to trick banks in the United States. Naskovets was arrested in the Czech Republic in April 2010 as part of a multinational law enforcement operation.

After Your Secure SSL Session Ends, Merchants can Theoretically Keep your Entire Customer Profile in Clear Text. Attackers love to Exploit Vulnerabilities in Online Stores to Steal that Data.

Popular digital faxing service eFax, from j2 Global Communications, today announced significant enhancements to its service that bring increased functionality, including digitized signatures, enhanced security, increased storage capacity.New Security Enhancements to eFax include: • Digitized signatures: Ability to Drag, drop, and fax or email signed documents.

According to a recent advisory, a new variant of spyware "Spy.Felxispy" targeting Symbian devices has recently been identified by the National Computer Virus Emergency Response Centre of China. According to NetQin, more than a dozen variants of the spyware have emerged since the first was spotted, and the latest has affected 150,000+ devices. Note that Spy.Felxispy is NOT new malware, these are variants of it. The malware is also sometimes know as “Trojan-Spy:SymbOS/Flexispy.A” as identified by security firm F-Secure and...

The Internet Systems Consortium (ISC) and US-CERT have issued a high severity vulnerability warning, discovered by Neustar, which affects BIND, the most widely used DNS software on the Internet. Successful exploitation could enable attacker to cause Bind servers to stop processing all requests.

New mobile malware targeting Android devices has been spotted in China, mobile security company NetQin warned today. Dubbed "Hong Tou Tou", NetQin is currently tracking two variants including "BD.HongTouTou.A”, which was discovered on February 18th, and “BD.HongTouTou.B”, which it discovered today.

US Digital Transactions Corporation (USDT) announced availability of a solution designed to help combat the growing problem of “friendly fraud,” the term used for when a consumer purchases an item, receives it, and without valid reason refuses acceptance of the charge for the transaction by initiating a chargeback with their bank/card issuer.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Cloud Security

Cloud Security

Financial terms of the translation were not disclosed but reports out of Tel Aviv valued the deal in the range of $350 million.