Now on Demand: Threat Detection and Incident Response (TDIR) Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

MITRE has shared information on how China-linked hackers abused VMware for persistence and detection evasion in the recent hack.

Bolster has raised $14 million in Series B funding for technology integrations for its AI-powered phishing protection platform.

The Association of California School Administrators (ACSA) is informing nearly 55,000 individuals that they have been impacted by a ransomware attack.

Under the new U.S. Cyber Trust Mark Initiative, manufacturers can affix the label on their products if they meet federal cybersecurity standards.

Attackers are getting more sophisticated, better armed, and faster. Nothing in Rapid7’s 2024 Attack Intelligence Report suggests that this will change.

It will be interesting to see how AI continues to evolve and how it is used by defenders as they attempt to leapfrog attackers and protect the organization against new forms of AI attacks.

Unfading Sea Haze has been targeting military and government entities in South China Sea countries since 2018.

The personal information of 400,000 individuals was compromised in a data breach at El Centro Del Barrio (CentroMed).

Intercontinental Exchange, the company that operates NYSE and other exchanges, has agreed to pay a $10 million fine related to a 2021 hack.

Mastercard is integrating AI into its fraud-prediction technology that it expects will be able to see patterns in stolen cards faster and allow banks to replace them before they are used by criminals.

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit takes place on Wednesday, May 22nd as a fully immersive virtual summit.

People on the Move

Wendy Zheng named as CFO and Joe Diamond as CMO at cyber asset management firm Axonius.

Intelligent document processing company ABBYY has hired Clayton C. Peddy as CISO.

Digital executive protection services provider BlackCloak has appointed Ryan Black as CISO.

Joe Levy has been appointed Sophos’ permanent CEO, and Jim Dildine has been named the company’s CFO.

CISA executive assistant director for cybersecurity Eric Goldstein is leaving the agency after more than three years.

More People On The Move
2024 Attack Intelligence Report 2024 Attack Intelligence Report

Attackers are getting more sophisticated, better armed, and faster. Nothing in Rapid7’s 2024 Attack Intelligence Report suggests that this will change.

As chatbots become more adventurous, the dangers will increase.

CISA CISA

CISA has added CVE-2023-43208, an unauthenticated remote code execution vulnerability, to its KEV catalog. 

Top Cybersecurity Headlines

MITRE has shared information on how China-linked hackers abused VMware for persistence and detection evasion in the recent hack.

Bolster has raised $14 million in Series B funding for technology integrations for its AI-powered phishing protection platform.

The Association of California School Administrators (ACSA) is informing nearly 55,000 individuals that they have been impacted by a ransomware attack.

Under the new U.S. Cyber Trust Mark Initiative, manufacturers can affix the label on their products if they meet federal cybersecurity standards.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 25-26, Ritz-Carlton, Half Moon Bay, CA]

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Learn More

Designed for senior level cybersecurity leaders to discuss, share and learn innovative information security and risk management strategies, SecurityWeek’s CISO Forum, will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit dives into Threat hunting tools and frameworks, and explores the value of threat intelligence data in the defender’s security stack.

Learn More

Vulnerabilities

Cybercrime

Malware targeting social networks appears to be the latest growing threat to mobile security. With people being “always connected” on mobile devices, and often not a full screen to easily see URL’s and click through destinations, it’s no surprise that mobile devices are appearing as the first device users are responding to threats with.

AirTight Delivers Managed Wi-Fi Access, PCI Scanning and Network Security in a Single Device AirTight Networks, a provider of Wireless intrusion prevention systems and services, has announced the launch of AirTight Cloud Services, a new suite of managed services which adds Wi-Fi access to its portfolio of on-demand wireless security and compliance solutions.

Strategies and Considerations for Securing Private Cloud EnvironmentsOn the back end of private cloud environments you’ll find multiple flavors of virtual software loaded directly onto hardware. This virtual software is essentially the host operating system. VM Host is the base hypervisor and hardware. Think of it as the house. The guest operating systems (Guest OSs) are the virtual machines living in the house.

Security Professionals are Plagued with Lack of Resources, too Much Work, too Little Time, and Competing Priorities. As a Result, we end up with Incomplete Security. If information security were simple, I would have been out of a job years ago. But we don't need to make it more complex than it is.

SonicWALL released its 2010 end-of-year summary of cyber-security intelligence today, revealing global trends in malicious network activity and application usage across its customer base.SonicWALL’s data, collected from over 30 countries worldwide, showed spikes in vulnerabilities on Mondays and Tuesdays, points to seasonal trends in threats associated with specific types of malware, with the most active time for threat-related traffic in the United States being between the hours of 10:00 AM. and 11:00 AM PST.

Zscaler, a provider of cloud-based security services, has hired Dr. Amit Sinha who will join the company as Chief Technology Officer to lead research and development initiatives of the company's emerging technologies.

Comprehensive Full-Disk Encryption Solution Helps Organizations Deploy, Maintain and Manage Data Security Protection Transparently Across Multiple PlatformsFull-disk encryption software provider WinMagic today launched the latest release of its full-disk encryption solution that helps organizations seamlessly data protection with existing security policies on Windows 7 (32 and 64 bit)/Vista/XP, Mac OS X Tiger/Leopard/Snow Leopard and/or Linux platforms.

Sourcefire Acquires Immunet Adding Cloud-Based Anti-Malware Technology to its PortfolioSourcefire announced late today that is has acquired Immunet, a cloud-based anti-malware technology company. Under the agreement, Sourcefire will pay $21 million in cash for Immunet, including $17 million up front and $4 million over the next 18 months upon achievement of delivery milestones.

Device Fingerprinting and Mobile Transactions Were on the Rise in 2010; What's in Store for Fraud Prevention in 2011?As companies continue to conduct more transactions online, they need tools to stop online fraud while protecting customer privacy without the use of cookies and cookie equivalents such as local stored objects.

BeyondTrust, a provider of privilege delegation and authorization management solutions, has joined forces with IT security risk and compliance solutions provider, Qualys, on a technology partnership that will enable customers to manage user access and privileges while expanding the coverage of security scans for a more complete view of IT security and compliance.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

A critical vulnerability tracked as CVE-2024-34359 and dubbed Llama Drama can allow hackers to target AI product developers.

Cloud Security

Cloud Security

Google is invoking the 'monoculture' word in response to a scathing U.S. government report on Microsoft's inadequate cybersecurity practices.