Now on Demand: Threat Detection and Incident Response (TDIR) Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

MITRE has shared information on how China-linked hackers abused VMware for persistence and detection evasion in the recent hack.

Bolster has raised $14 million in Series B funding for technology integrations for its AI-powered phishing protection platform.

The Association of California School Administrators (ACSA) is informing nearly 55,000 individuals that they have been impacted by a ransomware attack.

Under the new U.S. Cyber Trust Mark Initiative, manufacturers can affix the label on their products if they meet federal cybersecurity standards.

Attackers are getting more sophisticated, better armed, and faster. Nothing in Rapid7’s 2024 Attack Intelligence Report suggests that this will change.

It will be interesting to see how AI continues to evolve and how it is used by defenders as they attempt to leapfrog attackers and protect the organization against new forms of AI attacks.

Unfading Sea Haze has been targeting military and government entities in South China Sea countries since 2018.

The personal information of 400,000 individuals was compromised in a data breach at El Centro Del Barrio (CentroMed).

Intercontinental Exchange, the company that operates NYSE and other exchanges, has agreed to pay a $10 million fine related to a 2021 hack.

Mastercard is integrating AI into its fraud-prediction technology that it expects will be able to see patterns in stolen cards faster and allow banks to replace them before they are used by criminals.

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit takes place on Wednesday, May 22nd as a fully immersive virtual summit.

People on the Move

Wendy Zheng named as CFO and Joe Diamond as CMO at cyber asset management firm Axonius.

Intelligent document processing company ABBYY has hired Clayton C. Peddy as CISO.

Digital executive protection services provider BlackCloak has appointed Ryan Black as CISO.

Joe Levy has been appointed Sophos’ permanent CEO, and Jim Dildine has been named the company’s CFO.

CISA executive assistant director for cybersecurity Eric Goldstein is leaving the agency after more than three years.

More People On The Move
2024 Attack Intelligence Report 2024 Attack Intelligence Report

Attackers are getting more sophisticated, better armed, and faster. Nothing in Rapid7’s 2024 Attack Intelligence Report suggests that this will change.

As chatbots become more adventurous, the dangers will increase.

CISA CISA

CISA has added CVE-2023-43208, an unauthenticated remote code execution vulnerability, to its KEV catalog. 

Top Cybersecurity Headlines

MITRE has shared information on how China-linked hackers abused VMware for persistence and detection evasion in the recent hack.

Bolster has raised $14 million in Series B funding for technology integrations for its AI-powered phishing protection platform.

The Association of California School Administrators (ACSA) is informing nearly 55,000 individuals that they have been impacted by a ransomware attack.

Under the new U.S. Cyber Trust Mark Initiative, manufacturers can affix the label on their products if they meet federal cybersecurity standards.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 25-26, Ritz-Carlton, Half Moon Bay, CA]

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Learn More

Designed for senior level cybersecurity leaders to discuss, share and learn innovative information security and risk management strategies, SecurityWeek’s CISO Forum, will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit dives into Threat hunting tools and frameworks, and explores the value of threat intelligence data in the defender’s security stack.

Learn More

Vulnerabilities

Cybercrime

Red Hat today announced the availability of Red Hat Enterprise Linux 6.1, the first update to the platform since the delivery of Red Hat Enterprise Linux 6 in November 2010. With Red Hat Enterprise Linux 6.1, Red Hat continues to set the standard in flexibility, performance and quality that customers around the world rely on for their open source enterprise environments, spanning physical, virtual and cloud deployments.

According to recent survey findings coming from CyberSource, a Visa company, airlines lost an estimated $1.4 billion due to online payment fraud in 2010. But with so many security checks that come along with air travel, how is this possible? A typical fraud scenario in the airline industry plays out like this:

In February 2011, the clock finally ran out on IPv4, the trusty Internet Protocol that has been used to connect networked computers for the last 30 years. The Internet Assigned Numbers Authority (IANA), which manages the master pool of IP addresses, assigned its last five blocks of IPv4 space to the world's five Regional Internet Registries.

BeyondTrust today announced the acquisition of Lumigent Technologies, a Massachusetts-based provider of database security and activity monitoring solutions.As a result of the acquisition, BeyondTrust today announced PowerBroker Database, a solution that provides IT security departments with the ability to closely monitor database activity of privileged users, assess system configurations, and capture, alert, and report on changes to critical system configuration and business data.

Threats to our networks are faster, smarter, more prevalent, more targeted, and more elusive than ever before. At the same time, the number and types of operating systems, applications and services running on the network continue to grow. Gaining visibility into different user types – remote, mobile, third-parties, and by job function – and accommodating their unique requirements adds even greater complexity when it comes to protecting our IT infrastructure.

IT Security and data protection company Sophos today announced the availability of a number of new and enhanced mobile management and protection products for enterprises.

For nearly a year, 22 year-old Lucas Henderson of Texas has been creating and distributing fake coupons, resulting in hundreds of thousands of dollars lost by retailers and manufacturers. He surrendered in federal court last week.

A group of security and privacy researchers from the Institute of Media Informatics at Ulm University in Germany, is claiming to have discovered a serious security vulnerability in Google's ClientLogin protocol.In a recent analysis of the Android platform, the group discovered that when Android users are connected to an unencrypted open Wifi network, an attacker could both read transmitted synchronization data of Google Contacts, Calendar and Picasa Web Albums, and capture the authToken that’s user for authentication.

Autonomy Corporation, with dual headquarters in Cambridge, England and San Francisco, California, announced that it would acquire certain assets from Iron Mountain's digital division including archiving, eDiscovery, and online backup for $380 million in cash.The acquisition of assets will bring over six petabytes of data under management and more than 6,000 customers to Autonomy's customer base, bringing its private cloud data to over 25 petabytes and total customer base to over 25,000.

Over the weekend Sony began a phased restoration by region of PlayStation Network and Qriocity Services, but the company’s work is not done just yet.Following cyber attack on its data center in San Diego, California, Sony shut down the PlayStation Network and Qriocity services on April 20, to conduct an investigation and make enhancements to its security. Since then, the company has been working with several outside security firms, and says it has implemented new and additional security measures that...

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

A critical vulnerability tracked as CVE-2024-34359 and dubbed Llama Drama can allow hackers to target AI product developers.

Cloud Security

Cloud Security

Google is invoking the 'monoculture' word in response to a scathing U.S. government report on Microsoft's inadequate cybersecurity practices.