Now on Demand: Threat Detection and Incident Response (TDIR) Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

MITRE has shared information on how China-linked hackers abused VMware for persistence and detection evasion in the recent hack.

Bolster has raised $14 million in Series B funding for technology integrations for its AI-powered phishing protection platform.

The Association of California School Administrators (ACSA) is informing nearly 55,000 individuals that they have been impacted by a ransomware attack.

Under the new U.S. Cyber Trust Mark Initiative, manufacturers can affix the label on their products if they meet federal cybersecurity standards.

Attackers are getting more sophisticated, better armed, and faster. Nothing in Rapid7’s 2024 Attack Intelligence Report suggests that this will change.

It will be interesting to see how AI continues to evolve and how it is used by defenders as they attempt to leapfrog attackers and protect the organization against new forms of AI attacks.

Unfading Sea Haze has been targeting military and government entities in South China Sea countries since 2018.

The personal information of 400,000 individuals was compromised in a data breach at El Centro Del Barrio (CentroMed).

Intercontinental Exchange, the company that operates NYSE and other exchanges, has agreed to pay a $10 million fine related to a 2021 hack.

Mastercard is integrating AI into its fraud-prediction technology that it expects will be able to see patterns in stolen cards faster and allow banks to replace them before they are used by criminals.

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit takes place on Wednesday, May 22nd as a fully immersive virtual summit.

People on the Move

Wendy Zheng named as CFO and Joe Diamond as CMO at cyber asset management firm Axonius.

Intelligent document processing company ABBYY has hired Clayton C. Peddy as CISO.

Digital executive protection services provider BlackCloak has appointed Ryan Black as CISO.

Joe Levy has been appointed Sophos’ permanent CEO, and Jim Dildine has been named the company’s CFO.

CISA executive assistant director for cybersecurity Eric Goldstein is leaving the agency after more than three years.

More People On The Move
2024 Attack Intelligence Report 2024 Attack Intelligence Report

Attackers are getting more sophisticated, better armed, and faster. Nothing in Rapid7’s 2024 Attack Intelligence Report suggests that this will change.

As chatbots become more adventurous, the dangers will increase.

CISA CISA

CISA has added CVE-2023-43208, an unauthenticated remote code execution vulnerability, to its KEV catalog. 

Top Cybersecurity Headlines

MITRE has shared information on how China-linked hackers abused VMware for persistence and detection evasion in the recent hack.

Bolster has raised $14 million in Series B funding for technology integrations for its AI-powered phishing protection platform.

The Association of California School Administrators (ACSA) is informing nearly 55,000 individuals that they have been impacted by a ransomware attack.

Under the new U.S. Cyber Trust Mark Initiative, manufacturers can affix the label on their products if they meet federal cybersecurity standards.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 25-26, Ritz-Carlton, Half Moon Bay, CA]

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Learn More

Designed for senior level cybersecurity leaders to discuss, share and learn innovative information security and risk management strategies, SecurityWeek’s CISO Forum, will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit dives into Threat hunting tools and frameworks, and explores the value of threat intelligence data in the defender’s security stack.

Learn More

Vulnerabilities

Cybercrime

Following a cyber attack that resulted in the personal information of more than 75 Million PlayStation Network and Qriocity customers falling into the hands of hackers, Sony has shared some additional details on what it has done in response to bolster security and attempt to ease the minds of customers.

Today we have another major news event for cybercriminals to take advantage of. Following the successful operation by U.S. forces to kill Osama bin Laden, Internet users are searching in the masses for any details about the incident they can find. Cybercriminals know this and have already been at work to "poison" common search results hoping to gain access to people's computers and infect them with malware.

Users Cite Online Privacy and Security Fears as Top Reasons for Not Clicking Online AdvertisementsOnline security and privacy fears seem to be having a fairly significant effect on online marketing performance, according to data from a recent study.

An off-field error by a Yankees season ticket representative lead to a spreadsheet containing the personal information on more than 20,000 New York Yankees season ticket holders being sent out to several thousand Yankees season ticket licensees.

For mobile payments to reach a critical mass, they must work everywhere, every time. With that in mind, Visa released a set of mobile acceptance best practices this week for merchants, developers and device manufacturers who are using consumer mobile devices process card payments.

Have you ever seen those crazy late night commercials where a salesperson is trying to sell you things like the Snuggie or the knife that can cut anything? You’ll be pleased to learn that this indestructible blade is the last one you’ll ever need. Do you need to chop some onions? Do you have a stray brick lying about that you’ve been meaning to saw through?

Entrust announced today that it is extending its Non-Federal Identity SSP service to include Personal Identity Verification-Interoperable (PIV-I) compliance for state governments, the private sector and entities that wish to securely communicate and interoperate with the U.S. federal government.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

A critical vulnerability tracked as CVE-2024-34359 and dubbed Llama Drama can allow hackers to target AI product developers.

Cloud Security

Cloud Security

Google is invoking the 'monoculture' word in response to a scathing U.S. government report on Microsoft's inadequate cybersecurity practices.