Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Researchers warn about critical vulnerabilities in Ruijie Networks’ Reyee cloud management platform and Reyee OS network devices.

The new agreement has a narrower scope and additional safeguards to minimize the risk to national security.

Noteworthy stories that might have slipped under the radar: AV brand owner Gen Digital makes a $1 billion acquisition, Microsoft Recall captures sensitive data, MITRE releases ATT&CK evaluations.

Byte Federal says the personal information of 58,000 was compromised after a GitLab flaw allowed attackers to access a server.

The US announced the takedown of Rydox, a marketplace for stolen personal information, and the arrest of three administrators.

Microsoft has patched potentially critical vulnerabilities in Update Catalog and Windows Defender on the server side. 

Germany’s cybersecurity agency BSI has sinkholed a botnet of 30,000 devices shipped with BadBox malware pre-installed.

The Iranian threat group CyberAv3ngers has used custom-built malware named IOCONTROL to target IoT and OT devices in the US and Israel.

The Justice Department announced indictments against 14 North Koreans for involvement in a scheme to pose as remote IT workers to violate sanctions and commit wire fraud, money laundering, and identity theft.

Phishing is more than a mere nuisance—it is a formidable precursor to destructive data breaches.

Threat intel startup Silent Push has raised $10 million in a funding round co-led by Ten Eleven Ventures and Stepstone Group LP.

People on the Move

Mike Byron has been named Chief Financial Officer (CFO) at Exabeam.

Ex-GitHub chief technology officer Mike Hanley has joined GM as CISO.

Network security and compliance assurance firm Titania has appointed Victoria Dimmick as CEO.

Secure browser firm Conceal has appointed Eric Cornelius as Chief Executive Officer.

Shanta Kohli has been named CMO at Sysdig.

More People On The Move
China China

The new agreement has a narrower scope and additional safeguards to minimize the risk to national security.

IOCONTROL OT/ICS/IoT malware IOCONTROL OT/ICS/IoT malware

The Iranian threat group CyberAv3ngers has used custom-built malware named IOCONTROL to target IoT and OT devices in the US and Israel.

North Korean fake IT workers indicted North Korean fake IT workers indicted

The Justice Department announced indictments against 14 North Koreans for involvement in a scheme to pose as remote IT workers to violate sanctions and commit wire fraud, money laundering, and identity theft.

Top Cybersecurity Headlines

Cleo has released patches for the exploited vulnerability and security firms have detailed the malware delivered in attacks.

Cupertino ships iOS 18.2 and macOS Sequoia 15.2 patches to fix data leakage, sandbox escapes and code exection vulnerabilities.

Google’s Willow quantum chip marks a transformative moment in quantum computing development.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Don’t miss this Live Attack Demonstration to learn how hackers operate and gain knowledge to strengthen your defenses against deepfake and BEC fraud.

Register

Learn how to develop a holistic solution that provides you and your team the power to mitigate cyber threats effectively within your OT environment.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 2025, Stay Tuned]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

Huddle with your peers to measure the costs, benefits, and risks of deploying machine learning and predictive AI tools in the enterprise, the threat from adversarial AI and deepfakes, and preparation for the inevitable compliance and regulations. (December 4, 2024)

Learn More

SecurityWeek’s Identity & Zero Trust Strategies Summit is laser focused on helping organizations to level up their Identity and Zero Trust security strategies. (Oct. 9, 2024)

Learn More

Vulnerabilities

Cybercrime

In November 2011, the FBI and international authorities announced the disruption a massive cybercrime scheme that infected more than four million computers with DNSChanger Malware, malicious software that actively changes an infected system's DNS resolution settings to use rogue servers that can redirect traffic to malicious servers and attempt to steal personal information and generate illegitimate ad revenu

While we must continue to invest in new technologies that provide detection of the latest threats, detection alone isn’t enough.Traditional security solutions are falling short of providing needed protection because they’re typically blind to changing conditions and new attacks. Simply put: you can’t protect what you can’t see.

Netherlands-based AVG Technologies today announced the pricing of its initial public offering of 8.0 million ordinary shares at a priced to at $16.00 per share, an offering that in total will raise approximately $128 million, but net slightly less than $64 million in the company’s pockets after investment banking fees, underwriting discounts and commissions.

Wave Systems, a Massachusetts-based provider of encryption and security solutions, this week launched Wave Encryption Service (WES), a cloud-based encryption solution designed to be easy to deploy, manage and enforce.

More Formidable Security Threats and High-Profile Attacks Drive Enterprise Demand for Security Intelligence Services Research from International Data Corporation (IDC) on the threat intelligence market, a sector made up of advanced security event monitoring and management technologies that incorporate a variety of threat-related information sources to develop predictive security, predicts the market to grow from $198 million in 2009 to $905 million in 2014.

BlackBerry 7 Devices Get FIPS 140-2 Certification for U.S. and Canadian Governments BlackBerry maker Research In Motion (RIM) today announced that BlackBerry mobile devices running its new BlackBerry 7 and BlackBerry 7.1 Operating Systems  have been awarded FIPS (Federal Information Processing Standard) 140-2 certification by the National Institute of Standards and Technology (NIST) and the Communications Security Establishment Canada (CSEC).

Chainmail is Composed of Several Layers, as Should Your Security Strategy.Everyone has heard of the “layered” security approach, yet very few security professionals seem to fully appreciate what is actually meant by it, nor do they know how to go about designing such a strategy. The conventional view is similar to an ice cream sandwich-- each layer piled on top of the other, providing a thick pillow of protection that a would-be information assassin has to fully penetrate in order...

Akamai Technologies has released its State of the Internet report for the third quarter of 2011, based on data collected from its massive global network. In it, they observed that attack traffic online originated from 195 countries or regions, but that more than half of this traffic came from the Asia-Pacific region.

IBM Moves to Secure Mobile devices with New Endpoint Manager Suite, Announces Aquisition of Mobile Software Firm Worklight IBM, on Tuesday, announced a new endpoint management suite aimed at mobile devices, in addition to hinting at further R&D in the segment thanks to a recent acquisition. The new software is one of the first to leverage the technology portfolio obtained after Big Blue purchased BigFix software in 2010.

Researchers at M86 Security say hackers have compromised hundreds of Web sites that use Wordpress as part of an attack campaign using the Phoenix exploit kit.“A few days ago, hundreds of websites, based on WordPress 3.2.1, were compromised,” blogged Daniel Chechik, security researcher at M86 Security. “The attacker uploaded an HTML page to the standard Uploads folder and that page redirects the user to the Phoenix Exploit Kit. Its logs show that users from at least four hundred compromised sites...

Experts Say The Government and the Private Sector Need to Work Together Better, Faster and Across More Sectors.There has been a growing awareness during the past few years that cyber-security is an important element of military defense – a fact that was underscored by recent research from McAfee and Brussels-based think tank Security & Defence Agenda (SDA).

McAfee has announced McAfee Mobile Security 2.0, confirming the software’s presence in the Android Market last week, which appeared out of the blue to some users. The update is a step forward for overall resource usage and cosmetic improvements, but the base functionality remains the same.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Google has announced the open source availability of Vanir, a patch validation tool for Android platform developers.

Cloud Security

Cloud Security

Researchers warn about critical vulnerabilities in Ruijie Networks’ Reyee cloud management platform and Reyee OS network devices.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.