Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

According to a barebones Apple advisory, the new iOS 18.0.1 fixes two bugs that expose passwords and audio snippets to malicious hackers.

The coordinated action resulted in the seizure of more than 100 domains used for spear-phishing targets in the US, UK, and Europe.

CISO salaries are getting higher and experience counts. Average annual compensation for these cybersecurity leaders is more than $550K.

The hack of a police system that exposed contact details of all Dutch police officers was almost certainly carried out by hackers working for a foreign government, the justice minister said.

Jenkins has released patches for multiple high- and medium-severity vulnerabilities impacting the automation tool and several plugins.

An Ivanti EPM SQL injection vulnerability tracked as CVE-2024-29824 has been exploited to target some of the company’s customers.

A critical-severity vulnerability in Cisco NDFC could allow attackers to execute commands with elevated privileges.

Several e-filing and record management systems used in various US states were affected by serious vulnerabilities exposing sensitive data.

Over 4,000 Adobe Commerce and Magento stores unpatched against an exploited vulnerability have been compromised.

CISA director Jen Easterly says there is no chance a foreign adversary can change the results of the upcoming US election.

The latest Chrome and Firefox security updates address multiple high-severity vulnerabilities affecting the popular web browsers.

People on the Move

Defense contractor Nightwing has appointed Tricia Fitzmaurice as Chief Growth Officer.

Xage Security has appointed Russell McGuire as CRO and Ashraf Daqqa as VP of the META region.

Mario Duarte, formerly head of security at Snowflake, has joined Aembit as CISO.

Kevin Mandia has joined Expel’s board of directors and has been named chair of the board at SpecterOps.

Adam Geller has joined Zscaler as Chief Product Officer.

More People On The Move
CISOs Salaries CISOs Salaries

CISO salaries are getting higher and experience counts. Average annual compensation for these cybersecurity leaders is more than $550K.

Rackspace Breach Rackspace Breach

A breach at Rackspace exposes the fragility of the software supply chain, triggering a blame game among vendors over an exploited zero-day.

DDoS attack DDoS attack

Cloudflare recently mitigated another record-breaking DDoS attack, peaking at 3.8 Tbps and 2.14 billion Pps. 

Top Cybersecurity Headlines

Previously seized LockBit websites have been used to announce more arrests, charges and infrastructure disruptions.

That dream of a decentralized privacy-retaining identity system able to combat AI-driven bots and deepfakes may not be as elusive as feared – courtesy of Tools for Humanity (TfH) and Worldcoin.

Gavin Newsom vetoed a landmark bill SB 1047 aimed at establishing first-in-the-nation safety measures for large artificial intelligence models.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join SecurityWeek and Hitachi Vantara for this this webinar to gain valuable insights and actionable steps to enhance your organization’s data security and resilience.

Register

The leading industrial cybersecurity conference for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 25-26, Ritz-Carlton, Half Moon Bay, CA]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

The Attack Surface Management Summit will dig into the transformative trends driving data security and provide insights and strategies to take full advantage of attack surface management technologies. (September 18, 2024)

Learn More

SecurityWeek’s Identity & Zero Trust Strategies Summit is laser focused on helping organizations to level up their Identity and Zero Trust security strategies. (Oct. 9, 2024)

Learn More

Vulnerabilities

Cybercrime

In 2009, Vivek Kundra was named as the country's first CIO and was charged with improving efficiency while also making government data more available to the public. Part of his plan was to transform federal IT management with a cloud-first policy and get away from wasteful spending on IT infrastructure. We’re slowly seeing a shift take place, and today an announcement was made on another set government IT assets moving to the cloud.

TRICARE Breach Potentially Puts 4.9 Million Individuals at RiskA massive data breach that could potentially affect 4.9 million individuals who received services from TRICARE, a provider of health care services to active and retired military personnel, was disclosed this week.

IT security talent is in high demand across government agencies and private companies, with a shortage of resources among the federal agencies that is creating a challenge in managing successful cybersecurity operations. Last year, the U.S. Cyber Command, which was scheduled to be “fully operational” by October 1st, missed its deadline, primarily due to the challenge of finding qualified personnel.

Juniper Networks today announced new enhancements to its Junos Pulse Mobile Security Suite, bringing new mobile device management and security controls, as well as an API to allow service providers and OEMs to integrate with the platform.

Along with the widely anticipated “Kindle Fire” tablet announced today, Amazon introduced a Cloud-Accelerated Web Browser that boosts the power of the tablet by using the computing power of Amazon Web Services cloud services, something Amazon is describing as a “split browser” architecture.

Dealing with the Aftermath of a Breach Is Challenging, but there are Things you Can do to Keep Things from Going from Bad to WorseBreaking into an enterprise’s digital vault is half the battle; the other part is getting away clean. If the arrest rates for hacking are any indication, that second part has become something of a science in the cyber-underground.

Despite the risk of steep fines and increased transaction fees, many businesses are still failing to maintain compliance with the Payment Card Industry Data Security Standard (PCI DSS). That’s according to a new report today from Verizon, showing that for the second year in a row, many businesses are struggling to comply with payment card security standards and putting consumers' information at risk.

Following customer outrage and privacy concerns over a policy to continue tracking drivers with GPS technology even after they have cancelled service, OnStar today said it has reversed its proposed policy changes and won’t be keeping a data connection to customers’ vehicles after the OnStar service is canceled.

Microsoft Crushes Another Botnet: "Operation b79" Neutralizes Kelihos BotnetMicrosoft today announced it has taken down the notorious Kelihos botnet, scoring yet another legal victory in the battle against the botnet business.

Like all computers, automobiles can be hacked and compromised. As auto manufacturers continue to rush new features to market, security cannot continue to be an afterthought.If you’ve watched Gone in Sixty Seconds or played the video game, you’ve seen how easily a car can be hotwired—especially older models. Just pry open the steering column, connect the battery wires and touch the starter wires together. Vroom!

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Application security and vulnerability management platform DefectDojo has raised $7 million in Series A funding.

Cloud Security

Cloud Security

Credentials are still the most common entry point for bad actors, even as businesses deploy multi-factor authentication (MFA) to strengthen defenses.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.