Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Lehigh Valley Health Network has agreed to pay a $65 million settlement in a class-action suit filed over a 2023 data breach.

Ireland’s Data Protection Commission said it has opened an inquiry into Google’s Pathways Language Model 2, also known as PaLM2.

“It’s critical to not only back up your critical workloads, but also to secure those backups against subsequent modification and deletion.”

SplxAI has raised $2 million in pre-seed funding to help organizations identify vulnerabilities in AI chat applications.

The Tel Aviv company attracts $15 million in a Series A investment to build an AI-powered compliance and risk management platform.

Intel on Tuesday published advisories covering more than 20 vulnerabilities affecting processors and other products.

Five reasons why “Ambulance Chasing” and mocking harm the security profession and are never a good idea.

Noise generated by the pixels on a screen can be leveraged to exfiltrate data from air-gapped computers in what is called a PIXHELL attack.

Microsoft has started introducing support for post-quantum algorithms in SymCrypt, its main cryptographic library.

Ivanti has released patches for multiple vulnerabilities in Endpoint Manager, Cloud Service Appliance, and Workspace Control.

Golf course management company KemperSports has disclosed a cyberattack and data breach impacting over 62,000 individuals. 

People on the Move

Barbara Larson has joined SentinelOne as Chief Financial Officer.

Amy Howland has been named Partner and CISO at Guidehouse.

Exabeam has appointed Kish Dill as Chief Customer Success Officer.

Cloud networking firm Aviatrix has named John Qian as CISO.

CrowdStrike has appointed Kartik Shahani as vice president of India and SAARC.

More People On The Move
Intel CPU attack Intel CPU attack

Intel on Tuesday published advisories covering more than 20 vulnerabilities affecting processors and other products.

Windows Downgrade Attack Windows Downgrade Attack

Patch Tuesday: Microsoft raises an alarm for in-the-wild exploitation of a critical flaw in Windows Update.

AI Convention AI Convention

Signed on September 5, 2024, the AI Convention is a laudable intent but suffers from the usual exclusions and exemptions necessary to satisfy multiple nations.

Top Cybersecurity Headlines

An academic researcher has devised a new method of exfiltrating data from air-gapped systems using radio signals from memory buses.

Kaspersky’s customers in the US are being acquired by cybersecurity firm Pango and will be offered UltraAV antimalware software.

Researchers and the TSA have different views on the impact of vulnerabilities in an airport security application that could allegedly allow the bypass of certain airport security systems.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Hear from cybersecurity experts as they explore the latest trends, challenges and innovations in Attack Surface Management.

Register

The leading industrial cybersecurity conference for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 25-26, Ritz-Carlton, Half Moon Bay, CA]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

The Attack Surface Management Summit will dig into the transformative trends driving data security and provide insights and strategies to take full advantage of attack surface management technologies. (September 18, 2024)

Learn More

SecurityWeek’s Identity & Zero Trust Strategies Summit is laser focused on helping organizations to level up their Identity and Zero Trust security strategies. (Oct. 9, 2024)

Learn More

Vulnerabilities

Cybercrime

Sin City, A.K.A Las Vegas, Nevada – is once again playing host this week to the Black Hat and DEFCON security conferences. With throngs of computer experts patrolling the Strip, it seems only fitting to take a moment to consider the threat landscape of online casinos.The Hacker, the Insider and Everything in Between

NTT Communications has boosted the capacity of its IP Network that connects Japan and the United States to 500 Gbps. The new capacity is equivalent to more than four centuries' worth of content in a daily newspaper, making the Internet pipe the leader in capacity between the two countries.

Although Groups Like LulzSec and Anonymous Have Created Headlines with Very High Profile Attacks, They Represent a Tiny Fraction of the Online Crime that Happens Around the World Each DayThe amount of new malware being created shot up 60 percent during the first half of 2011, according to a new report from Sophos.

Symantec has updated its Enterprise Vault archiving software with a mix of data classification technology and a new focus on social media content.In Enterprise Vault 10, Symantec is touting data classification as a means to help ease the archiving of Microsoft Exchange e-mail content and metadata as well as the ability to automatically archive content from social media sites such as Facebook.

Palo Alto Networks, the network security company best known for its Next Generation Firewalls, on Monday will announce that VeriSign CEO, Mark D. McLaughlin, will join Palo Alto Networks and take the reigns as president and CEO of the company. The fast growing company had been without a CEO for 8 months.

Say you’re pulled over, can a police offer demand you turn over your cell phone? Is the officer entitled to look at or take your phone, or for that matter, any other device such as a laptop or tablet?In a recent episode of NBC’s Press:Here, Hanni Fakouri of the Electronic Frontier Foundation addresses and discusses individual’s legal rights, and what you should do if you’re found in a situation where law enforcement attempts to access or take your electronic devices.

While an increasing portion of IT budgets are being allocated towards security, 70 percent of respondents in a recent IT security survey said they have been impacted by security breaches and still struggle to mitigate attacks due to limited time and resources.

I assume there are a few technology arenas more confusing that security (though, probably not many). Even when I have lunch with my small business counterparts and we talk security, I find a lot of misconceptions about what web security is all about.

According to a recent market research report from Gartner, 44 percent of the $16.5 billion worldwide security software market in 2010 belonged to the five largest vendors, including Symantec, McAfee, Trend Micro, IBM and EMC’s RSA.The combined market share for the top five vendors has dropped from 60 percent since 2006, according to Gartner’s report, “Market Trends: An Ever-Consolidating Security Market Never Consolidated”.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

SaaS applications are so easy to use, the decision, and the deployment, is sometimes undertaken by the business unit user with little reference to,...