Now on Demand: Threat Detection and Incident Response (TDIR) Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

MITRE has shared information on how China-linked hackers abused VMware for persistence and detection evasion in the recent hack.

Bolster has raised $14 million in Series B funding for technology integrations for its AI-powered phishing protection platform.

The Association of California School Administrators (ACSA) is informing nearly 55,000 individuals that they have been impacted by a ransomware attack.

Under the new U.S. Cyber Trust Mark Initiative, manufacturers can affix the label on their products if they meet federal cybersecurity standards.

Attackers are getting more sophisticated, better armed, and faster. Nothing in Rapid7’s 2024 Attack Intelligence Report suggests that this will change.

It will be interesting to see how AI continues to evolve and how it is used by defenders as they attempt to leapfrog attackers and protect the organization against new forms of AI attacks.

Unfading Sea Haze has been targeting military and government entities in South China Sea countries since 2018.

The personal information of 400,000 individuals was compromised in a data breach at El Centro Del Barrio (CentroMed).

Intercontinental Exchange, the company that operates NYSE and other exchanges, has agreed to pay a $10 million fine related to a 2021 hack.

Mastercard is integrating AI into its fraud-prediction technology that it expects will be able to see patterns in stolen cards faster and allow banks to replace them before they are used by criminals.

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit takes place on Wednesday, May 22nd as a fully immersive virtual summit.

People on the Move

Wendy Zheng named as CFO and Joe Diamond as CMO at cyber asset management firm Axonius.

Intelligent document processing company ABBYY has hired Clayton C. Peddy as CISO.

Digital executive protection services provider BlackCloak has appointed Ryan Black as CISO.

Joe Levy has been appointed Sophos’ permanent CEO, and Jim Dildine has been named the company’s CFO.

CISA executive assistant director for cybersecurity Eric Goldstein is leaving the agency after more than three years.

More People On The Move
2024 Attack Intelligence Report 2024 Attack Intelligence Report

Attackers are getting more sophisticated, better armed, and faster. Nothing in Rapid7’s 2024 Attack Intelligence Report suggests that this will change.

As chatbots become more adventurous, the dangers will increase.

CISA CISA

CISA has added CVE-2023-43208, an unauthenticated remote code execution vulnerability, to its KEV catalog. 

Top Cybersecurity Headlines

MITRE has shared information on how China-linked hackers abused VMware for persistence and detection evasion in the recent hack.

Bolster has raised $14 million in Series B funding for technology integrations for its AI-powered phishing protection platform.

The Association of California School Administrators (ACSA) is informing nearly 55,000 individuals that they have been impacted by a ransomware attack.

Under the new U.S. Cyber Trust Mark Initiative, manufacturers can affix the label on their products if they meet federal cybersecurity standards.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 25-26, Ritz-Carlton, Half Moon Bay, CA]

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Learn More

Designed for senior level cybersecurity leaders to discuss, share and learn innovative information security and risk management strategies, SecurityWeek’s CISO Forum, will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit dives into Threat hunting tools and frameworks, and explores the value of threat intelligence data in the defender’s security stack.

Learn More

Vulnerabilities

Cybercrime

Most organizations aren’t prepared to prevent and respond to web infrastructure failures caused by distributed denial of service (DDoS) attacks and Domain Name System (DNS) failures. These conclusions came from two studies commissioned by VeriSign that show the urgent need for robust DDoS protection, reliable and secure DNS infrastructure, and advanced threat intelligence.

Mobile devices offer well-established benefits in terms of productivity and efficiency gains for employees and enhanced services for consumers. But there’s a catch: The ways smart phones, laptops and tablets interconnect work life and personal life raise serious security challenges for organizations—and the stakes are high.

McAfee has announced a new platform designed to help organizations take advantage of cloud computing in a safe, secure and efficient way.The McAfee Cloud Security Platform operates by securing all content and data traffic – including email, web and identity traffic – moving between an organization and cloud infrastructure.

Back on April 12, 2011, a report from independent security testing organization NSS Labs, warned of a vulnerability affecting industry-leading firewalls, including a sneak attack that could go unnoticed by most organizations. The dangerous vulnerability came in the form of a TCP Split Handshake Attack, an attack essentially being the TCP Equivalent of IP Spoofing.

While reading recent articles on the Sony breaches, I noticed many comments in the forums saying things like, “if you connect to the Internet, you should consider yourself breached.” Although I understand the sentiment, I can’t help but wonder, is it really that bad?

IT Security and data protection firm Sophos, today announced it has entered into an agreement to acquire Astaro, a privately held provider of network security solutions with $56 million in billings and 30% year over year growth in 2010.Astaro is the fourth largest dedicated unified threat management (UTM) provider with over 56,000 installations in over 60 countries. The company currently has more than 220 employees in nine countries spanning three continents, including a significant presence in the EMEA region.

Perhaps you've seen the videos late at night: through a rain swept windshield, a grainy camera image shows a state patrol officer on a lonely road approaching a stopped vehicle, its license plate obscured. The sound is muted, but shouting ensues, and then the driver first attacks the law officer then is on the ground. In a court of law, these videos provide a much needed third-party view of the incident, assuming the chain of custody is well documented. Now...

The recent theft of millions of names and email addresses from Epsilon, a major email marketing services provider, along with the theft of 77 million names, email addresses and other personally identifiable information from Sony, has highlighted two needs: better user education, and new and improved technological

Entrust today announced a Software Development Kit (SDK) designed to help banks transparently embed Entrust's strong authentication technology into new or existing mobile-banking applications.The Entrust IdentityGuard Mobile Software Development Kit is available for popular mobile platforms, including Apple, Google Android, RIM BlackBerry and Java.

At the Symantec Vision Conference in Las Vegas today, Symantec announced a new security application designed to help organizations extend the visibility of their IT infrastructure to include cloud-based applications such as Salesforce. The solution, Symantec Security Assessment for Salesforce, will be available on the Salesforce AppExchange and integrate with the Symantec Control Compliance Suite, providing customers a view of the security and compliance of information and applications whether they reside on premise or in the cloud.

The biggest trend in the healthcare industry in recent years has been the epic government-mandated move to electronic medical records (EMRs). This effort promises to bring long-term cost savings, improved efficiencies and productivity, and, ultimately, enhanced patient care. It’s truly a life-saving endeavor.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

A critical vulnerability tracked as CVE-2024-34359 and dubbed Llama Drama can allow hackers to target AI product developers.

Cloud Security

Cloud Security

Google is invoking the 'monoculture' word in response to a scathing U.S. government report on Microsoft's inadequate cybersecurity practices.