Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Citizen Lab publishes forensic proof that spyware maker Paragon can compromise up-to-date iPhones. Journalists in Europe among victims.

AI-generated voice deepfakes have crossed the uncanny valley, fueling a surge in fraud that outpaces traditional security measures. Detection technology is racing to keep up.

Hirundo tackles AI hallucinations and bias by making trained models “forget” poisoned, malicious, and confidential data.

The new attack technique uses smartwatches to capture ultrasonic covert communication in air-gapped environments and exfiltrate data.

Learn how attackers hide in plain sight—and what you can do to stop them without slowing down your business.

Microsoft recently patched CVE-2025-32711, a vulnerability that could have been used for zero-click attacks to steal data from Copilot.

It’s time for enterprises to stop treating unmanaged devices as an edge case and start securing them as part of a unified Zero Trust strategy.

Between May 2024 and April 2025, Cloudflare blocked 109 billion malicious requests targeting organizations protected under Project Galileo.

Palo Alto Networks has released patches for seven vulnerabilities and incorporated the latest Chrome fixes in its products.

Interpol has announced a crackdown on infostealer malware in Asia as part of an effort called Operation Secure.

Beyond potentially halting sales of physical goods, breaches can expose customers’ personal data to future phishing or fraud attempts.

People on the Move

SAP security firm SecurityBridge announced the appointment of Roman Schubiger as the company’s new CRO.

Cybersecurity training and simulations provider SimSpace has appointed Peter Lee as Chief Executive Officer.

Orchid Security has appointed a new Chief Product Officer and three advisors.

Kaseya has appointed Rania Succar as Chief Executive Officer.

Identity security company Silverfort has appointed Howard Greenfield as President and Chief Revenue Officer.

More People On The Move
SmartAttack air gap attack SmartAttack air gap attack

The new attack technique uses smartwatches to capture ultrasonic covert communication in air-gapped environments and exfiltrate data.

Interpol targets infostealers Interpol targets infostealers

Interpol has announced a crackdown on infostealer malware in Asia as part of an effort called Operation Secure.

Cyera funding Cyera funding

Series E funding round brings Cyera’s total funding to over $1.3 billion and values the data security firm at $6 billion.

Top Cybersecurity Headlines

Redmond warns that external control of a file name or path in WebDAV “allows an unauthorized attacker to execute code over a network.”

United Natural Foods has taken some systems offline after detecting unauthorized activity on its IT systems, causing disruptions to operations.

President Trump says his new cybersecurity executive order amends problematic elements of Biden- and Obama-era executive orders.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Register

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

PITTSBURGH (AP) — An Ohio man will plead guilty to sending anonymous YouTube threats in which he claimed to have hacked into the University of Pittsburgh's computer system on the heels of a series of unrelated disruptive bomb threats, his attorney told The Associated Press. Brett Hudson will admit he's guilty "and he's going to get on with his life," defense attorney Warner Mariani said.

On Monday, Google announced that IMAP/SMTP and XMPP would be getting a security boost in the form of OAuth 2.0. The transition comes as the company depreciates older standards (OAuth 1.0a) on the GMail and Google Talk services. Ryan Troll, a member of Google’s Application Security Team, said in a blog post that the changes are part of a long term plan to support additional mechanisms to protect user information.

HONG KONG - Chinese telecom giant Huawei is perplexed at its treatment in the West, with the United States fearful it is a Trojan horse for cyber warfare even as Europe eagerly courts its business. The contrast was stark last week when the private company's elusive founder and chief executive officer, Ren Zhengfei, appeared alongside British Prime Minister David Cameron at the signing of a $2 billion investment deal in London.

FireHost, a Dallas based cloud hosting provider that has made security the focus of its offerings, today announced that it has raised $10 Million in a Series C round of funding. The announcement comes just about a year to the day when the company announced that it raised $10 Million in a Series B funding round last September. 

In response to reports of a Zero-Day vulnerability targeting all versions of Internet Explorer, with the single exception of Internet Explorer 10, Microsoft has confirmed the issue and offered guidance to customers.

New Features Niagara Framework 3.7 include Enhanced Security and Built-in Mobile Support Today, Tridium, the Honeywell subsidiary that makes the Niagara Framework, pushed a significant update to its flagship software product.

TDL4, also known as TDSS in some circles, is a Root Kit that targets the MBR (Master Boot Record) and is nearly impossible to remove. At one point, it was responsible for a botnet with more than 4 million hosts, earning the title of indestructible. Now, researchers at Damballa have discovered a new iteration of TDSS, which uses a new command and control (C&C) communication method that is helping it push a new click-fraud initiative.

Journalists in Beijing are being sent malicious email attachments, which would enable a backdoor into their systems. This latest round of attacks on reporters marks the third such incident, and as usual, the government denies all speculation that it may be behind the attacks.

In an effort to get the attention of the university and the media, a group going by the name of NullCrew has published a list of some 4,000 names and a hand full of passwords, said to have been taken from the University of Cambridge’s Press portal. In response, the university has insisted that there has been no breach.

The Internet is a virtual environment within the physical properties of the infrastructure that enables its existence. It is tied to geography and there are physical linkages to entities such as IP addresses or domain names. However, the logical topology of the networks that own the information space can be quite different.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Security researchers uncover critical flaws and widespread misconfigurations in Salesforce’s industry-specific CRM solutions.

Cloud Security

Artificial Intelligence

Maze and its investors are betting on finding profits in software that uses AI-powered agents to automate critical parts of the process.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.