Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Researchers warn about critical vulnerabilities in Ruijie Networks’ Reyee cloud management platform and Reyee OS network devices.

The new agreement has a narrower scope and additional safeguards to minimize the risk to national security.

Noteworthy stories that might have slipped under the radar: AV brand owner Gen Digital makes a $1 billion acquisition, Microsoft Recall captures sensitive data, MITRE releases ATT&CK evaluations.

Byte Federal says the personal information of 58,000 was compromised after a GitLab flaw allowed attackers to access a server.

The US announced the takedown of Rydox, a marketplace for stolen personal information, and the arrest of three administrators.

Microsoft has patched potentially critical vulnerabilities in Update Catalog and Windows Defender on the server side. 

Germany’s cybersecurity agency BSI has sinkholed a botnet of 30,000 devices shipped with BadBox malware pre-installed.

The Iranian threat group CyberAv3ngers has used custom-built malware named IOCONTROL to target IoT and OT devices in the US and Israel.

The Justice Department announced indictments against 14 North Koreans for involvement in a scheme to pose as remote IT workers to violate sanctions and commit wire fraud, money laundering, and identity theft.

Phishing is more than a mere nuisance—it is a formidable precursor to destructive data breaches.

Threat intel startup Silent Push has raised $10 million in a funding round co-led by Ten Eleven Ventures and Stepstone Group LP.

People on the Move

Mike Byron has been named Chief Financial Officer (CFO) at Exabeam.

Ex-GitHub chief technology officer Mike Hanley has joined GM as CISO.

Network security and compliance assurance firm Titania has appointed Victoria Dimmick as CEO.

Secure browser firm Conceal has appointed Eric Cornelius as Chief Executive Officer.

Shanta Kohli has been named CMO at Sysdig.

More People On The Move
China China

The new agreement has a narrower scope and additional safeguards to minimize the risk to national security.

IOCONTROL OT/ICS/IoT malware IOCONTROL OT/ICS/IoT malware

The Iranian threat group CyberAv3ngers has used custom-built malware named IOCONTROL to target IoT and OT devices in the US and Israel.

North Korean fake IT workers indicted North Korean fake IT workers indicted

The Justice Department announced indictments against 14 North Koreans for involvement in a scheme to pose as remote IT workers to violate sanctions and commit wire fraud, money laundering, and identity theft.

Top Cybersecurity Headlines

Cleo has released patches for the exploited vulnerability and security firms have detailed the malware delivered in attacks.

Cupertino ships iOS 18.2 and macOS Sequoia 15.2 patches to fix data leakage, sandbox escapes and code exection vulnerabilities.

Google’s Willow quantum chip marks a transformative moment in quantum computing development.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Don’t miss this Live Attack Demonstration to learn how hackers operate and gain knowledge to strengthen your defenses against deepfake and BEC fraud.

Register

Learn how to develop a holistic solution that provides you and your team the power to mitigate cyber threats effectively within your OT environment.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 2025, Stay Tuned]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

Huddle with your peers to measure the costs, benefits, and risks of deploying machine learning and predictive AI tools in the enterprise, the threat from adversarial AI and deepfakes, and preparation for the inevitable compliance and regulations. (December 4, 2024)

Learn More

SecurityWeek’s Identity & Zero Trust Strategies Summit is laser focused on helping organizations to level up their Identity and Zero Trust security strategies. (Oct. 9, 2024)

Learn More

Vulnerabilities

Cybercrime

Trustwave captured the public’s attention over the weekend, when its policy regarding subordinate root certificates led to the discovery that one of its customers used them to monitor their employee’s SSL communications. Reacting to the public’s ire, Trustwave explained the incident on its company blog, and promised to end the practice moving forward.

The Cloud is Very Different, but the Approach to Adoption Needs to go Back to Basics. Buyer Beware? No, buyer be Smart and Educated.

It is not surprising that customer records would be the main target for attackers. But a database of financial records from a major bank is not their most common target – instead it’s the food and beverage industry that has proved most appetizing.In its 2012 Global Security Report, Trustwave revealed that for the second year in a row, the food and beverage industry comprised nearly 44 percent of the data breach investigations in 2011. Retail businesses were the second largest...

Symantec confirmed with SecurityWeek today, that following claims from Anonymous that additional Symantec product source code would be released, the claims are true, and the said files are in fact the legitimate source code from its pcAnywhere product.

Clickjacking, a term coined by Jeremiah Grossman in 2008, is quickly becoming an extremely dangerous threat. Recent news coverage of enormous clickjacking schemes are bringing this type of threat to the forefront. The term clickjacking, for those not familiar, refers to a type of attack that’s designed to get individuals to unknowingly click on nefarious links or buttons. From there, hackers are able to garner confidential information, get users to take an action online they normally wouldn’t, or compromise their...

Symantec has updated its portfolio of backup products with new releases emphasizing speed and simplicity.In Symantec NetBackup 7.5, the company has added NetBackup Accelerator to speed backups. Other new features include NetBackup Replication Director, which integrates NetApp Snapshots with backup, and NetBackup Search, which allows the search and recovery of backup data.

On Monday, details emerged of what appeared to be an email exchange between a Symantec employee and a hacker using the alias “YamaTough” who claimed he was in possession of Symantec source code back in January, showing that the hacker may have attempted to extort the company, and that Symantec had been negotiating a deal to pay the hacker in exchange for the code not to be released. The exchange, however, was not between Symantec and the hacker, but between...

Visa today announced that U.S. banks have issued an estimated one million Visa-branded, EMV chip-enabled cards as the end of 2011. The milestone shows progress the industry is making toward implementing the more secure card technology, but the U.S. is far behind Europe in terms of adoption.

Hacker Sentenced to 30 Months in Prison for Hacking into Marriott Systems to Extort Employment from the CompanyA hacker who tried to land an IT job at Marriott by hacking into the company’s computer systems and then unwisely extorting the company into hiring him, has been sentenced to 30 months in prison.

Palo Alto Networks Appoints Steffan Tomlinson as Chief Financial Officer Palo Alto Networks, the Santa Clara, California based network security company best known for its Next Generation Firewalls, on Thursday announced that it has appointed Steffan Tomlinson as its new Chief Financial Officer.

Google Highlights Security Processes for Android, Adds New Layer of SecurityOn Thursday, Google outlined a few of their processes for protecting users and securing the Android Market. In addition, they highlighted some interesting facts, which seem to place the rash of mobile risk reports being pushed by security firms into perspective.

With Facebook’s recent IPO filing revealing that it holds over 100 petabytes of photos and videos from its massive global base of 845 million users, it’s no secret that hiding in those millions of profiles are many fake accounts created and operated by cybercriminals.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Google has announced the open source availability of Vanir, a patch validation tool for Android platform developers.

Cloud Security

Cloud Security

Researchers warn about critical vulnerabilities in Ruijie Networks’ Reyee cloud management platform and Reyee OS network devices.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.