CONFERENCE Virtual Event Today: Threat Detection & Incident Response (TDIR) Summit - Join the Event
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

A mandatory filing to the Maine Attorney General says 69,461 customers nationwide were affected and dates the breach back to last December.

Matthew Lane allegedly hacked PowerSchool using stolen credentials and admitted to extorting a telecoms provider.

Wireless carrier Cellcom has confirmed that a week-long widespread service outage is the result of a cyberattack.

Google DeepMind has developed an ongoing process to counter the continuously evolving threatIndirect prompt injection (IPI) attacks.

Wiz warns that threat actors are chaining two recent Ivanti vulnerabilities to achieve unauthenticated remote code execution.

SecurityWeek’s 2025 Threat Detection & Incident Response (TDIR) Summit takes place as a virtual summit on Wednesday, May 21st.

Many of the industrial control system (ICS) instances seen in internet scanning are likely or possibly honeypots, not real devices.

Kettering Health has canceled inpatient and outpatient procedures as it deals with a system-wide outage caused by a ransomware attack.

An OpenPGP.js vulnerability tracked as CVE-2025-47934 allows message signature verification to be spoofed. 

VMware patches flaws that expose users to data leakage, command execution and denial-of-service attacks. No temporary workarounds available. 

The Likely Exploited Vulnerabilities (LEV) equations can help augment KEV- and EPSS-based remediation prioritization. 

People on the Move

PAM provider Keeper Security has appointed Shane Barney as its Chief Information Security Officer.

SpecterOps has appointed Tim Bender as CFO, Pat Sheridan as CRO, and Bryce Hein as CMO.

CISA has officially announced the appointment of Madhu Gottumukkala as its new deputy director.

Cloud and cybersecurity MSP Ekco has appointed Ben Savage as UK CEO.

Shane Barney has been appointed CISO of password management and PAM solutions provider Keeper Security.

More People On The Move
TDIR Virtual Summit TDIR Virtual Summit

SecurityWeek’s 2025 Threat Detection & Incident Response (TDIR) Summit takes place as a virtual summit on Wednesday, May 21st.

ICS honeypot scanning ICS honeypot scanning

Many of the industrial control system (ICS) instances seen in internet scanning are likely or possibly honeypots, not real devices.

Pwn2Own Berlin 2025 results Pwn2Own Berlin 2025 results

Pwn2Own participants demonstrated exploits against VMs, AI, browsers, servers, containers, and operating systems.

Top Cybersecurity Headlines

The 15th edition of NATO’s Locked Shields cyber defense exercise brought together 4,000 experts from 41 countries.

American steel giant Nucor on Wednesday disclosed a cybersecurity incident that bears the hallmarks of a ransomware attack.

The China-linked hacking group Earth Ammit has launched multi-wave attacks in Taiwan and South Korea to disrupt the drone sector.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Join this webinar for a fascinating discussion to understand why data in itself is not enough to make informed decisions for prioritization.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

Apple patched a vulnerability in its remote desktop product where the connection isn't being encrypted correctly. This may result in information disclosure, Apple said in its advisory.

Visa said on Tuesday that it is rolling out a new service for acquirers and their merchants that will help to better secure payment card data. The service, Visa Merchant Data Secure with Point-to-Point Encryption, will be fully available to customers by early 2013.

In response to the code required to crack MS-CHAPv2 sessions being published to the Web, Microsoft has issued a security advisory for organizations that may need guidance. However, the software giant has made it clear that while the issue is worth addressing, it is not something they plan to address with a security update.

NEW DELHI - (AFP) - India has demanded social networking websites take down provocative messages and blocked some online content after anonymous threats sparked an exodus of migrants from southern cities. Tens of thousands of workers and students from the remote northeast region returned home last week from Bangalore, Mumbai and other cities fearing attacks from Muslims in reprisal for recent ethnic clashes in the state of Assam.

PARIS - (AFP) - Wireless routers for homes and offices could be knitted together to provide a communications system for emergency responders if the mobile phone network fails, German scientists reported on Monday. In many countries, routers are so commonplace even in medium-sized towns that they could be used by fire services, ambulance and police if cellphone towers and networks are down or overwhelmed by people caught up in an emergency, they say.

The Securities and Exchange Commission (SEC) on Friday said that it took actions to halt what they are saying was a $600 million Internet-based Ponzi scheme. The SEC said that it took “emergency actions” and froze assets controlled by Paul Burks of Lexington, North Carolina and his company, Rex Venture Group, operator of the website ZeekRewards.com.

A recent study from Four Points by Sheraton shows that of their business travelers, a majority carry three to four devices with them, which are both for business and personal use. While the hotel’s study was aimed at how well they serve business travelers, it offers a different perspective on BYOD risk.

Defense contractor General Dynamics today said that it would acquire Fidelis Security Systems, a provider of network security tools that provide real-time network visibility, analysis and control. The terms of the deal have not been disclosed, but the acquisition has been approved by the boards of both companies and is expected to close in the third quarter of 2012.

You’ve handed over controls to a third-party, so how do you implement the right levels of security in a cloud environment, trust the provider to take care of the rest, and still meet compliance initiatives?

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Code quality and security firm CodeAnt has secured $2 million in seed funding and it has been valued at $20 million.

Cloud Security

Cloud Security

VMware patches flaws that expose users to data leakage, command execution and denial-of-service attacks. No temporary workarounds available. 

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.