Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

The Treasury Department announced sanctions in connection with a massive Chinese hack of American telecommunications companies and a breach of its own computer network.

TikTok said it will have to “go dark” this weekend unless Biden assures the company it won’t enforce a shutdown after the Supreme Court upheld the ban.

CISA and other agencies call to action for the US government to take steps to close the software understanding gap.

Noteworthy stories that might have slipped under the radar: several multi-million dollar settlements, CrowdStrike-themed phishing emails, and MITRE launches D3FEND 1.0.

Law firm Wolf Haldenstein Adler Freeman & Herz LLP says more than 3.4 million people were impacted by a December 2023 data breach.

Google releases OSV-SCALIBR, an open source library for software composition analysis and file system scanning.

The US Treasury has sanctioned two individuals and four entities involved in the North Korean fake IT worker scheme.

Industry professionals comment on the Biden administration’s new executive order on cybersecurity. 

Three vulnerabilities in SimpleHelp could allow attackers to compromise the remote access software’s server and the client machine.

Cisco has unveiled AI Defense, a solution designed to help organizations protect development and use of AI applications. 

Microsoft researchers catches Russia’s Star Blizzard hackers spear-phishing with QR codes and WhatsApp group chats.

People on the Move

Karl Triebes has joined Ivanti as Chief Product Officer.

Steven Hernandez has joined USAID as CISO and Deputy CIO.

Data security and privacy firm Protegrity has named Michael Howard as its CEO.

Anand Ramanathan has been appointed as Chief Product Officer at Deepwatch.

Managed security platform provider Deepwatch has appointed Sammie Walker as CMO.

More People On The Move
US sanctions Chinese company for hacking US sanctions Chinese company for hacking

The Treasury Department announced sanctions in connection with a massive Chinese hack of American telecommunications companies and a breach of its own computer network.

Healthcare data breach Healthcare data breach

In 2024 organizations informed the US government about 585 healthcare data breaches affecting a total of nearly 180 million user records.

CISA CISA

Jen Easterly hopes CISA is allowed to continue its election-related work under new leadership despite “contentiousness” around that part of its mission.

Top Cybersecurity Headlines

Fortinet patches critical vulnerabilities, including a zero-day that has been exploited in the wild since at least November 2024. 

Patch Tuesday: Microsoft’s January Patch Tuesday rollout includes fixes for 160 security defects, the largest number of CVEs addressed in any single month since at least 2017.

Attackers are exploiting a critical vulnerability in Aviatrix Controller to execute arbitrary code in AWS cloud environments.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Explore trends and technologies that will shape the future of cybersecurity. Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 2025, Stay Tuned]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.(February 26, 2025)

Learn More

Supply Chain Security Summit
Join us as we explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects. (March 19, 2025)

Learn More

Vulnerabilities

Cybercrime

Researchers at Trusteer have spotted a new attack vector from Zeus that aligns perfectly with previous financially motivated targets. Based on the information collected and previous attacks, it appears as if the newer Zeus configurations will remain focused on the bigger fish.

On Tuesday, Adobe released a security bulletin to address multiple vulnerabilities in Adobe Reader X (10.1.2) and earlier versions for Windows and Macintosh, Adobe Reader 9.4.6 and earlier versions for Linux, and Adobe Acrobat X (10.1.2) and earlier versions for Windows and Macintosh. According to Adobe, exploitation of the vulnerabilities may allow an attacker to execute arbitrary code or cause a denial-of-service condition.

When it comes to letting someone go, very rare will you find a business leader who enjoys that part of the job. When you have to fire a network security administrator, not only is it a downer, it’s a risky proposition – unless you follow basic steps.

Microsoft patched 11 security vulnerabilities today, including a critical bug being targeted by attackers. Microsoft released a total of six security bulletins, including four rated ‘critical.’ The vulnerabilities exist across Microsoft Windows, Microsoft Office, Internet Explorer, Forefront United Access Gateway (UAG) and the .NET Framework.

Why doesn’t Everyone have Security Intelligence? One of the Reasons is Superstition.“Step on a crack, break your mother’s back.” Not just lyrics by Devo, but an actual superstition. While it’s mostly just practiced by kids who don’t yet know they’re nascent Parkour enthusiasts, you can observe adults today taking that extra half step occasionally to avoid lines in the sidewalk. You may even catch yourself doing it subconsciously.

Mocana MAP 2.0 Helps Secure Apps Running on iOS DevicesSmart device security firm Mocana, today introduced the latest version of its solution designed to help organizations add fine-grained security and usage policies around individual mobile apps with ease.

Controversial Domain Registrar Tightens Policy After Reports of Rogue Online Pharmacy LinksRegistrar Internet.bs has changed its domain name registration policy in light of reports criticizing its links to as many as one-third of the rogue pharmacies on the Internet.

On Friday, Palo Alto Networks, the network security firm that has made its mark developing next generation firewalls, filed an S-1 registration statement with the Securities and Exchange Commission for a widely-anticipated initial public offering.

Researchers at NQ Mobile, working alongside researchers at North Carolina State University, have discovered new Android malware that is controlled via SMS that can do a number of things on the compromised device including recording calls and surrounding noise.

Supports of Anonymous targeted the U.K. on Saturday, hitting the websites of the Home Office and the Ministry of Justice. While the attack only lasted a short time, Anonymous has said to expect more of the same as they push forward. Currently, the next target is said to be the GCHQ on April 14.

Network attacks and breaches have dominated the technical and mainstream news for the past 18 months, as attacks have grown both in volume and significance. Hacktivists used data breaches to embarrass their enemies, nation-states used intrusions to steal secrets and even directly attack infrastructure, and organized crime used breaches for good old-fashioned theft.

GreenSQL, a company that SecurityWeek first met earlier this year during the RSA Conference, recently released the results of a poll that included more than 6,000 customers, IT administrators, DBAs, InfoSec practitioners, and consultants. The results, when focused on information security and database security, show that the majority fear SQL Injection vulnerabilities.

What to Do When Your Website Has Been HackedWhile the following is by no means exhaustive, here are a few suggestions to begin with if your web site has been hacked.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

CISA and other agencies call to action for the US government to take steps to close the software understanding gap.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.