CONFERENCE NOW LIVE: Threat Detection & Incident Response (TDIR) Summit - Join the Event In-Progress
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

GitLab and Atlassian have released patches for over a dozen vulnerabilities in their products, including high-severity bugs.

Russian military intelligence hackers intensify targeting of Western logistics and technology companies moving supplies into Ukraine. 

Redmond’s threat hunters found 394,000 Windows systems talking to Lumma controllers, a victim pool that included global manufacturers. 

More than 100 AutomationDirect MB-Gateway devices may be vulnerable to attacks from the internet due to CVE-2025-36535.

SecurityWeek’s 2025 Threat Detection & Incident Response (TDIR) Summit takes place as a virtual summit on Wednesday, May 21st.

A mandatory filing to the Maine Attorney General says 69,461 customers nationwide were affected and dates the breach back to last December.

Matthew Lane allegedly hacked PowerSchool using stolen credentials and admitted to extorting a telecoms provider.

Wireless carrier Cellcom has confirmed that a week-long widespread service outage is the result of a cyberattack.

Google DeepMind has developed an ongoing process to counter the continuously evolving threatIndirect prompt injection (IPI) attacks.

Wiz warns that threat actors are chaining two recent Ivanti vulnerabilities to achieve unauthenticated remote code execution.

Many of the industrial control system (ICS) instances seen in internet scanning are likely or possibly honeypots, not real devices.

People on the Move

Jeremy Koppen has left Mandiant after 13 years to become the CISO of Equifax.

Engineering and technology solutions provider Amentum has appointed Max Shier as its CISO.

PAM provider Keeper Security has appointed Shane Barney as its Chief Information Security Officer.

SpecterOps has appointed Tim Bender as CFO, Pat Sheridan as CRO, and Bryce Hein as CMO.

CISA has officially announced the appointment of Madhu Gottumukkala as its new deputy director.

More People On The Move
ICS honeypot scanning ICS honeypot scanning

Many of the industrial control system (ICS) instances seen in internet scanning are likely or possibly honeypots, not real devices.

Pwn2Own Berlin 2025 results Pwn2Own Berlin 2025 results

Pwn2Own participants demonstrated exploits against VMs, AI, browsers, servers, containers, and operating systems.

NATO Locked Shields NATO Locked Shields

The 15th edition of NATO’s Locked Shields cyber defense exercise brought together 4,000 experts from 41 countries.

Top Cybersecurity Headlines

American steel giant Nucor on Wednesday disclosed a cybersecurity incident that bears the hallmarks of a ransomware attack.

The China-linked hacking group Earth Ammit has launched multi-wave attacks in Taiwan and South Korea to disrupt the drone sector.

Google bundles multiple safeguards under a single Android toggle to protect high-risk users from advanced mobile malware implants.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Join this webinar for a fascinating discussion to understand why data in itself is not enough to make informed decisions for prioritization.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

Enigma Module Offers Full Disk Encryption for USB Storage DrivesEnova Technology, a Taiwan-based provider of encryption solutions, on Monday launched a USB encryption solution designed to provide consumers and enterprises with real-time full disk encryption for just about any USB mass storage class drive.

In the physical world, some metropolitan areas manage growth by creating boundaries. In the online world, growth is also controlled with boundaries. And right now, we’re in the middle of setting the course for how the real estate of the Internet will be labeled and accessed for years to come with the Internet Corporation for Assigned Names and Numbers (ICANN) new gTLD Program.

McAfee announced on Tuesday that it has been awarded a multi-year Enterprise Level Agreement contract from the Department of Homeland Security (DHS) that could be valued up to $12 million. Under the contract, McAfee says it plans to provide the DHS with a number of of enterprise wide network and system security products, services and support, including expanding the DHS’s continuous monitoring and security capabilities.

WELLINGTON - (AFP) - Megaupload boss Kim Dotcom on Tuesday accused New Zealand police of kicking and punching him when they raided his Auckland mansion earlier this year to arrest him for alleged copyright piracy.Dotcom told the Auckland High Court he tried to surrender peacefully to police during the raid in January, when about 70 armed police cooperating with a major US online piracy probe raided the mansion.

SEOUL- (AFP) - South Korea's Samsung Electronics said Tuesday it had launched a super-size version of its Galaxy Note smartphone, the latest salvo in its battle with Apple for the multi-billion-dollar handheld market.The Galaxy Note 10.1, which went on sale on Monday in Germany and the United Arab Emirates, is almost twice as wide as its predecessor and nearly the size of a tablet.

Ever wonder how some Twitter accounts seemingly became so popular overnight? According to Barracuda Networks, it is not always due to the person's celebrity or charisma, but instead is tied to a thriving black market for phony social networking accounts.

Apple’s tech support department is taking some heat after their actions led to a journalist losing control of all of the data associated with his iCloud account, which in turn led to the compromise of Gizmodo’s Twitter account over the weekend.

On Friday, Reuters reported that its blogging platform was compromised and used to post false news stories. As it turned out, not only was the publishing platform targeted, but Reuters’ Twitter accounts were as well.

Would you, could you, protect my data? Protect it now, protect it then, please protect it everywhen. Protect my health and banking stuff, though it can be, will be rough.

When Public Relations Departments Do Cybercrime Research A recent article on ProPublica dissected two commonly quoted figures about cybersecurity: $1 Trillion in losses due to cybercrime itself, and $388 billion related to consumer monetary losses and time spent repairing the damage caused by cybercrime. Both figures, according to the article are hyperbole to say the least.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Code quality and security firm CodeAnt has secured $2 million in seed funding and it has been valued at $20 million.

Cloud Security

Cloud Security

VMware patches flaws that expose users to data leakage, command execution and denial-of-service attacks. No temporary workarounds available. 

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.