Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Ahold Delhaize has confirmed that data was stolen from its systems in November 2024 after a ransomware group claimed the attack.

A Windows NTLM vulnerability patched in March has been exploited in attacks targeting government and private institutions.

Minh Phuong Ngoc Vong pleaded guilty to defrauding US companies of roughly $1 million in a fake IT worker scheme.

While the Security Posture Management buzz is real, its long-term viability depends on whether it can deliver measurable outcomes without adding more complexity.

Atlassian and Cisco have released patches for multiple high-severity vulnerabilities, including remote code execution bugs.

Servers exposed to complete takeover due to CVE-2025-32433, an unauthenticated remote code execution flaw in Erlang/OTP SSH.

Our collective voices and one community will provide the intelligence we need to safeguard our businesses in today’s modern digital environment.

CISA is making recommendations for organizations and users in light of the recent Oracle legacy cloud environment hack.

The Chinese state-sponsored group Mustang Panda has used new and updated malicious tools in a recent attack.

A SonicWall SMA 100 series vulnerability patched in 2021, which went unnoticed at the time of patching, is being exploited in the wild.

Windows versions of the BrickStorm backdoor that the Chinese APT used in the MITRE hack last year have been active for years.

People on the Move

After the passing of Amit Yoran, Tenable has appointed Steve Vintz and Mark Thurmond as co-CEOs.

Former Wiz executive Trish Cagliostro has joined Orchid Security as Chief Revenue Officer.

Transcend has named former UnitedHealth Group CISO Aimee Cardwell as CISO in Residence.

Ketan Tailor has joined Barracuda Networks as Chief Customer Officer.

Axonius has appointed former Disney CISO Ryan Knisley as its Chief Product Strategist.

More People On The Move
Windows vulnerability exploited Windows vulnerability exploited

A Windows NTLM vulnerability patched in March has been exploited in attacks targeting government and private institutions.

SonicWall vulnerability exploited SonicWall vulnerability exploited

A SonicWall SMA 100 series vulnerability patched in 2021, which went unnoticed at the time of patching, is being exploited in the wild.

Apple patches vulnerabilities Apple patches vulnerabilities

The vulnerabilities are described as code execution and mitigation bypass issues that affect Apple’s iOS, iPadOS and macOS platforms.

Top Cybersecurity Headlines

The US government’s cybersecurity agency CISA has “executed the option period on the contract” to keep the vulnerability catalog operational.

China accuses three alleged U.S. NSA operatives of cyberattacks targeting critical infrastructure and the Asian Games in Harbin.

Customers of the Hertz, Thrifty, and Dollar brands had their personal information stolen as a result of the Cleo hack last year.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

This webinar will guide you in aligning your security testing strategy with the right tools, helping you move beyond identifying weaknesses to effectively validating your overall security posture.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

This event delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Learn More

Supply Chain Security Summit
Join us as we explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects. (March 19, 2025)

Learn More

Vulnerabilities

Cybercrime

Network security firm Cyberoam has released an update for all of its unified threat management (UTM) devices in response to the leak of the default private key used by all of the company's UTM devices. The company pushed the fix out over-the-air after an anonymous poster leaked the key online. The update forces devices to use unique certificate authority (CA) SSL certificates when intercepting SSL traffic on corporate networks.

Law enforcement demanded access to text messages, caller locations, and other data 1.3 million times in 2011. These figures come from a series of reports issued by the nation’s cellphone carriers, as requested by Congress, and marks the first time such data has been made available.According to the New York Times, the reports document “an explosion in cellphone surveillance in the last five years, with the companies turning over records thousands of times a day in response to police emergencies,...

The developer for DarkComet, a Remote Access Tool (Trojan), has pulled the application and ended development. The tool’s less than stellar reputation, as well as legal concerns, were listed as two of the main reasons for the project’s abrupt conclusion.Jean-Pierre Lesueur, the one responsible for bringing DarkComet to the masses, said that he toiled away at DarkComet for years and offered it freely in exchange for one thing - that those using it would do so responsibly. However, clearly that...

AlienVault, the San Mateo, California-based company behind open source SIEM, OSSIM, and the AlienVault Open Threat Exchange, today announced that it has closed a $22.4 million Series C funding round led by Kleiner Perkins Caufield & Byers (KPCB) and Sigma—two prominent venture firms.

Yesterday, SecurityWeek reported on a blog post by Microsoft security researcher Terry Zink, who said that a spammer had control of Android devices. As it turns out, while malware on the Android platform is a reality, spammers may not have gained total control.  “All of these message are sent from Android devices,” Zink wrote initially. He was commenting on an unusually high number of junk emails that had Yahoo Mail headers, and an Android-based signature.

After the discovery of systems infected with an unknown family of malware at India’s Eastern Naval Command, the country has quickly pinned the blame on China. India’s accusal is based on the fact that data harvested from the infected systems was copied to a server with a IP address in China.

In a letter sent to partners, Jay Bavisi, President and CEO of the EC-Council, said that the company responsible for making Certified Ethical Hackers (C|EH) had launched an investigation after one of their own embezzled company funds.

A Google Android botnet has been spotted spamming messages pushing counterfeit medication. According to Sophos, the activity represents the latest way to monetize Android botnets. Traditionally, mobile malware has made money by intercepting SMS messages used as part of two-factor authentication mechanisms for online banks and charging fees for premium-rate SMS messages. This botnet however is sending messages that push Viagra and Cialis.

Apple’s closed model, while criticized by many, has kept iPhone and iPad users relatively safe from malware and other potentially malicious apps, especially when compared to Android users.While some iOS apps have been called into question before over privacy concerns and aggressive advertising tactics, Kaspersky Lab researchers are saying they have discovered an iOS app that they are outright calling malware.

The latest iteration of PCI compliance regulations adds to the already increasing burdens of the typical IT security professional. With it comes fear, uncertainty and doubt for those looking to execute PCI compliance controls properly and in turn to preserve their jobs. I had a chance recently to present as a guest keynote speaker at the North America CACS ISACE conference on implementing sound compliance and audit controls for key management.

Venafi, a Salt Lake City, Utah-based provider of enterprise key and certificate management solutions, has shared the results of scans performed on 450 Global 2000 companies, revealing that on average, nearly one in five digital security certificates deployed by the organizations rely on a technology that makes them open targets for Flame-, Stuxnet- and Duqu-style malware breaches.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Lemonade says the incident is not material and that its operations were not compromised, nor was its customer data targeted.

Cloud Security

Cloud Security

The greatest security policies in the world are useless if enterprises don’t have a reasonable, consistent, and reliable way to implement them.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.