Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

AI-powered threat prevention company Augur (rebranded from SecLytics) has raised $7 million in seed funding.

Combined with AI, polymorphic phishing emails have become highly sophisticated, creating more personalized and evasive messages that result in higher attack success rates.

The FBI received roughly 860,000 complaints of malicious activity in 2024, with reported losses exceeding $16.6 billion.

Blue Shield of California says a website misconfiguration exposed the health information of its members to Google.

Cisco is investigating the impact of the Erlang/OTP remote code execution vulnerability CVE-2025-32433 on its products.

Yale New Haven Health System recently discovered that the personal information of millions of patients was stolen from its systems.

Identity protection startup AuthMind has announced raising $19.3 million in a seed funding round led by Cheyenne Ventures.

Desired Effect provides an ethical vulnerability exchange marketplace to help defenders get ahead of attackers.

Endor Labs has raised $93 million in a Series B funding round and announced a major expansion of its AppSec platform.

The cash infusion brings Chainguard’s total funding to about $612 million since launching in 2021 and prices the company at $3.5 billion.

A security researcher has discovered hundreds of leaked secrets by restoring files deleted from GitHub repositories.

People on the Move

Raffi Joukhadarian has been named Managing Director and Chief Financial Officer at MorganFranklin Cyber.

Data security firm Rubrik has appointed Kavitha Mariappan as its Chief Transformation Officer.

DARPA veteran Dan Kaufman has joined Badge as SVP, AI and Cybersecurity.

Kelly Shortridge has been promoted to VP of Security Products at Fastly.

After the passing of Amit Yoran, Tenable has appointed Steve Vintz and Mark Thurmond as co-CEOs.

More People On The Move
Healthcare data breach Healthcare data breach

Yale New Haven Health System recently discovered that the personal information of millions of patients was stolen from its systems.

Marks&Spencer cyberattack Marks&Spencer cyberattack

British retailer Marks & Spencer has been experiencing certain service disruptions after falling victim to a cyberattack.

SK Telecom cyberattack SK Telecom cyberattack

SK Telecom, South Korea’s largest telecom company, disclosed a data leak involving a malware infection.

Top Cybersecurity Headlines

Microsoft security chief Charlie Bell says the SFI’s 28 objectives are “near completion” and that 11 others have made “significant progress.”

With unapproved AI tools entrenched in daily workflows, experts say it’s time to shift from monitoring to managing Shadow AI use across the enterprise.

A Windows NTLM vulnerability patched in March has been exploited in attacks targeting government and private institutions.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

This webinar will guide you in aligning your security testing strategy with the right tools, helping you move beyond identifying weaknesses to effectively validating your overall security posture.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

Microsoft today said that it has acquired PhoneFactor, a provider of phone-based multi-factor authentication (MFA) technology. Founded in 2001, Overland Park, Kansas-based PhoneFactor counts hundreds of customers that use its technology which enables customers to deploy multi-factor authentication across a wide range of platforms and applications.

When Apple's iPhone 5 went on sale less than two weeks ago, IT administrators braced themselves for the onslaught of these new devices coming into the enterprise. It's not all bad news for the IT department, though, as some of the new features can be centrally managed, security experts say.

The European Network and Information Security Agency (ENISA), Europe’s cyber security agency, today kicked off a cyber security exercise across Europe designed to help Nations be prepared to deal with cyber attacks.During the exercise, more than 300 cyber security professionals in 25 countries across Europe will test their skills and ability to work together, in order to defend against a massive simulated cyber-attack.

Trend Micro has released version 5 of its Business Security Services (BSS) suite, tagged with the moniker of worry free, which for the majority of mom and pop operations is exactly what they need.

DHS Secretary Janet Napolitano met with the Homeland Security Advisory Council’s (HSAC) Task Force on CyberSkills this week, where they discussed the latest developments in improving the agency’s cybersecurity initiatives. In July, Secretary Napolitano directed the HSAC to form the task force due to the increasing demand to fill staffing gaps, by seeking experts from the cybersecurity field across industry, academia and government.

In May, Nielsen released a study that found more the number of apps per smartphone in the U.S. jumped 28 percent between 2011 and 2012. Assuming this trend does not suddenly end, mobile app developers should expect to be busy.  

While it may be years before Keccak (pronounced “catch-ack”) is adopted for wide use, that doesn’t take away from the new cryptographic hash algorithm’s promise, or the effort spent in developing it. The NIST launched the search for SHA-3 five years ago, as a way to prepare for the loss of SHA-2 should it be broken.

WASHINGTON - US officials said Wednesday they shut down a series of so-called tech support scams, mostly operating from India, which duped consumers into paying to clean their computers of bogus virus infections. The Federal Trade Commission said a US judge has ordered a halt to six "scareware" operations and has frozen their assets following an investigation in cooperation with Canada, Britain, Australia and New Zealand.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Endor Labs has raised $93 million in a Series B funding round and announced a major expansion of its AppSec platform.

Cloud Security

Cloud Security

The greatest security policies in the world are useless if enterprises don’t have a reasonable, consistent, and reliable way to implement them.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.