Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Sygnia discovered what it believes to be a variant of the GhostEmperor infection chain leading to the Demodex rootkit – which was first seen and described in 2021.

CISA warns of the in-the-wild exploitation of CVE-2024-39891, a Twilio Authy bug leading to the disclosure of phone number data.

Michigan Medicine is notifying roughly 57,000 individuals of a data breach impacting their personal and health information.

Siemens has released out-of-band updates to patch two potentially serious vulnerabilities in products used in energy supply. 

Verizon subsidiary TracFone Wireless settles for $16 million with the FCC over three old data breaches.

Vanta has raised $150 million in a Series C funding round and it plans on using the money to fuel expansion and AI innovation.

Chrome 127 was promoted to the stable channel with patches for 24 vulnerabilities, including 16 reported externally.

CrowdStrike has shared a preliminary incident review, explaining why the update that caused global chaos was not caught by testing. 

Delta has canceled more than 5,500 flights since the outage started early Friday morning.

KnowBe4 chief executive Stu Sjouwerman: “We sent them their Mac workstation, and the moment it was received, it immediately started to load malware.”

Canadian cybersecurity startup Protexxa closes a $10 million Series A funding round that brings the total raised to $15 million.

People on the Move

Check Point Software has appointed Nadav Zafrir as Chief Executive Officer

BlackFog has named Brenda Robb as President, John Sarantakes as CRO, and Mark Griffith as VP of Strategic Sales

Former NSA cybersecurity chief Rob Joyce has joined Sandfly Security’s Advisory Board.

Commvault has appointed Pranay Ahlawat as Chief Technology and AI Officer (CTAIO).

Teresa Anania has joined Sophos as the company’s new Chief Customer Officer.

More People On The Move
CrowdStrike Remediation Information CrowdStrike Remediation Information

CrowdStrike has shared a preliminary incident review, explaining why the update that caused global chaos was not caught by testing. 

FrostyGoop ICS malware FrostyGoop ICS malware

The FrostyGoop ICS malware was used recently in an attack against a Ukrainian energy firm that resulted in loss of heating for many buildings.

CrowdStrike IT Recovery Tool CrowdStrike IT Recovery Tool

Microsoft says roughly 8.5 million Windows devices were impacted by the faulty software update from CrowdStrike, and published a tool to help admins through the recovery process.

Top Cybersecurity Headlines

CrowdStrike on Saturday provided technical information and remediation guidance to help organizations impacted by the faulty software update that trigged massive IT outages across the globe on Friday.  

CrowdStrike says a routine sensor configuration update pushed to Windows OS triggered a logic error that blue-screened computers worldwide.

Organizations worldwide are reporting major outages due to Windows system crashes caused by a bad CrowdStrike update.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how to utilize tools, controls, and design models needed to properly secure cloud environments.

Register

The leading industrial cybersecurity conference for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 25-26, Ritz-Carlton, Half Moon Bay, CA]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s annual cloud security virtual summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs.

Learn More

SecurityWeek’s Identity & Zero Trust Strategies Summit is laser focused on helping organizations to level up their Identity and Zero Trust security strategies.

Learn More

Vulnerabilities

Cybercrime

Nadeem Akhtar of Maryland faces charges for the illegal exportation of items that are used directly or indirectly in activities related to nuclear reactors and the processing and production of nuclear-related materials.“The indictment alleges that Nadeem Akhtar conspired to violate export regulations by selling controlled items while misrepresenting what they were and to whom they would be sold” said U.S. Attorney Rod J. Rosenstein.

Last week we looked at how underground markets operate. Similarly to any market economy, the goods being traded in these markets are driven by supply and demand. There is no Consumer Price Index (CPI) for these illicit items. Yet, by tapping into hacker forums we can see the different goods being sold in these forums, as well as their asking price.

According to recent research conducted by Mimecast, while 71% of employees understand the risks, 47% still feel that it’s okay to use personal accounts to send work emails. The goal of Mimecast’s Generation Gmail Research project is to reveal how email is used by employees across the globe. And, in this particular segment, how attitudes about work email are changing and how progressive employers are managing this core communication channel.

New VMware View Client for iPad Lets Enterprise and Government Users Securely Access Their Virtual Desktops From AnywhereVMware today released a client that provides iPad users with a simple and secure way to access virtual Windows desktops, applications and data from their iPad. Available for free in the Apple App Store, the new VMware View Client, in combination with VMware View, delivers a modern desktop optimized for the iPad's high-resolution Multi-Touch display.

According to recent statistics coming from Dasient, a firm that helps discover and combat Web-based malware, “malvertising,” a growing method used to distribute malware via advertising tags served through an unsuspecting publisher’s Web site, saw a significant spike in Q4 2010. Dasient estimated that in the last quarter of 2010 there was a 25% increase in malvertising [ad] impressions based on the same set of networks the company monitored in Q3.

Today, Symantec and the Ponemon Institute released the 2010 Annual Study: U.S. Cost of a Data Breach, showing the rising cost of data breaches over the last five years. The average organizational cost of a data breach increased to $7.2 million. The study also found that for the second straight year organizations' need to respond rapidly to data breaches drove the associated costs higher. The sixth annual Ponemon Cost of a Data Breach report is based on the actual data...

Rapid7 today announced upgrades to its Metasploit Pro penetration testing solution. The latest version (v3.6) adds an enhanced command-line feature set and detailed PCI reports with pass/fail information to provide users with a comprehensive view of compliance posture with PCI regulations.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Cloud Security

Cloud Security

Join us as we explore the latest trends in the world of SaaS security, cyberattacks against cloud infrastructure, data security posture management (DSPM), and...