Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

The Italian government denied it hacked seven cellphones with military-grade surveillance technology from Paragon Solutions.

QuSecure is pitching a software-based security architecture that overlays onto current networks to help businesses with PQC migration.

A subgroup of the Russia-linked Seashell Blizzard is tasked with broad initial access operations to sustain long-term persistence.

Security and compliance automation firm Drata has acquired trust center platform SafeBase in a quarter billion dollar deal.

Ivanti and Fortinet on Tuesday released patches for multiple critical- and high-severity vulnerabilities in their products.

A new GAO report assesses that the Coast Guard needs to improve Maritime Transportation System (MTS) cybersecurity.

Chipmakers Intel, AMD and Nvidia on Tuesday published new security advisories to inform customers about vulnerabilities found in their products. 

A fresh post on the Kraken ransomware group’s leak website refers to data stolen in a 2022 cyberattack, Cisco says.

Industrial giants Schneider Electric and Siemens have released February 2025 Patch Tuesday ICS security advisories.

On the eve of the Munich Security Conference, Google argues that the cybercriminal threat should be treated as a national security threat like state-backed hacking groups.

The Microsoft Patch Tuesday machine hummed loudly this month with urgent fixes for a pair of already-exploited Windows zero-days.

People on the Move

Cyber exposure management firm Armis has promoted Alex Mosher to President.

Software giant Atlassian has named David Cross as its new CISO.

Dan Pagel has been named the new CEO of risk management and remediation firm Brinqa.

The City of Phoenix has promoted Mitch Kohlbecker to the role of Chief Information Security Officer.

Gigamon has promoted Tony Jarjoura to CFO and Ram Bhide has been hired as Senior VP of engineering.

More People On The Move
Seashell Blizzard Russia Seashell Blizzard Russia

A subgroup of the Russia-linked Seashell Blizzard is tasked with broad initial access operations to sustain long-term persistence.

Microsoft Zero-Days Microsoft Zero-Days

The Microsoft Patch Tuesday machine hummed loudly this month with urgent fixes for a pair of already-exploited Windows zero-days.

Intel security Intel security

Intel says roughly 100 of the 374 vulnerabilities it patched last year were firmware and hardware security defects.

Top Cybersecurity Headlines

Cupertino’s security response team said the flaw was used in “an extremely sophisticated attack against specific targeted individuals.” 

News analysis: The big AI platforms are emerging as frontline early warning systems, detecting nation-state hackers at the outset of their campaigns. Can this help save the threat intel industry?

SolarWinds will become a privately held company following its acquisition by Turn/River Capital for $4.4 billion in cash. 

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Examine the state of cybersecurity in the context of quantum computing and artificial intelligence. Discuss the implications of the new White House administration’s cybersecurity policies and how they will influence the industry’s direction in 2025 and beyond.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Watch Now

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 2025, Stay Tuned]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.(February 26, 2025)

Learn More

Supply Chain Security Summit
Join us as we explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects. (March 19, 2025)

Learn More

Vulnerabilities

Cybercrime

BEIRUT - (AFP) - Mobile phone and Internet services have been cut in Aleppo, Syria's second city, where a crucial battle is taking place between rebels and the army, the Syrian Observatory for Human Rights said on Thursday."Mobile telecommunications services and Internet have been cut off in the city of Aleppo since last night," it said. An activist, who asked not to be identified, confirmed that the Internet, landlines and some mobile services were down in the northern city, Syria's...

On Sunday, security researcher Michael Coppola gave a presentation at DEF CON that explored the process of compromising routers used in SOHO (Small Office / Home Office) environments, and turning them into botnet clients.

Verizon “Redefines” VERIS, Improves Open Information Sharing Verizon Business has publicly released the data anonymously submitted by organizations to its incident-sharing program and promised changes to make the system more collaborative and useful.

Last month, Dropbox announced that they had taken on outside help in order to investigate a potential data breach. The investigation kicked off after a dozens of users reported being spammed on accounts used exclusively for the service. Twelve days later, Dropbox has now confirmed the initial speculation, saying the spam originated from a compromised employee’s account.

HONG KONG - (AFP) - Chinese communications giant Huawei Technologies on Wednesday responded to US hackers' claims that its routers were easily cracked, saying its security strategies were rigorous.

A British market research firm, Goode Intelligence, says that biometrics for mobile devices will be an essential feature before the decade is out. Their claims come from previous forecasts that point to a market growth of nearly 39 million users by 2015. Smart Mobile Devices (SMDs) are now the personal device of choice, Goode notes, with sales outpacing PCs. The BYOD trend is accelerating the need for enhanced security as SMDs are being used more often for consumer and business-sensitive...

From Flame to Madi, malware used for cyber espionage continues to stay under the radar while silently swiping data from corporation's digital coffers. In a new report, Dell SecureWorks researcher Joe Stewart went inside this part of the cyber-underworld, uncovering a realm where hundreds of actors make, control and propagate malware designed to spy on institutions around the world.

In a talk on router hacking during Def Con on Sunday, Recurity Labs’ Felix (FX) Lindner told those in attendance that for the 20th anniversary of Def Con, the gift was China. This is because he was about to give a presentation on the seriously security challenged status of routers manufactured by Huawei.Update: China's Huawei Responds to US Hackers

IBM announced on Tuesday that it would be launching a new class of security appliance that targets the risks associated with social media. The IBM Security Network Protection XGS 5000 will focus on Web risk, but it is being pitched as a solution that will help organizations manage social media and other BYOD types of problems.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

San Francisco application security startup raises $100 million in a Series D funding round led by Menlo Ventures. 

Cloud Security

Application Security

APIs are easy to develop, simple to implement, and frequently attacked. They are  prime and lucrative targets for cybercriminals. 

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.