Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Aflac said that it’s in the early stages of a review of the incident, and so far is unable to determine the total number of affected individuals.

Noteworthy stories that might have slipped under the radar: China’s Salt Typhoon targeted Viasat, Washington Post emails compromised in hack, Rowhammer attack named Crowhammer.

Cloudflare has blocked yet another record-breaking DDoS attack, which delivered the equivalent of 9,000 HD movies in just 45 seconds.

The Godfather Android trojan uses on-device virtualization to hijack legitimate applications and steal users’ funds.

Threat actors are exploiting a critical-severity vulnerability in Motors theme for WordPress to change arbitrary user passwords.

WhatsApp told SecurityWeek that it linked the exploited FreeType vulnerability CVE-2025-27363 to a Paragon exploit.

A threat actor is abusing Cloudflare Tunnels for the delivery of a Python loader as part of a complex infection chain.

Krispy Kreme is sharing more information on the data breach resulting from the ransomware attack targeting the company in 2024. 

Personal data of former and current council workers, including election staff, may have been accessed by hackers.

Israel-linked Predatory Sparrow hackers torched more than $90 million at Iran’s largest cryptobank as Israel-Iran cyberwar escalates.

Trend Micro and ReversingLabs uncovered over 100 GitHub accounts distributing malware embedded in open source hacking tools.

People on the Move

Checkmarx has appointed Scott Gainey as Chief Marketing Officer.

Jason Hogg has been named Executive Chairman of CYPFER.

HUB Cyber Security has appointed former PayPal and American Express executive Paul Parisi as its Global Chief Revenue Officer.

Cloud security startup Upwind has appointed Rinki Sethi as Chief Security Officer.

SAP security firm SecurityBridge announced the appointment of Roman Schubiger as the company’s new CRO.

More People On The Move
WhatsApp Zero-Day Exploit WhatsApp Zero-Day Exploit

WhatsApp told SecurityWeek that it linked the exploited FreeType vulnerability CVE-2025-27363 to a Paragon exploit.

Encryption backdoor debate Encryption backdoor debate

After decades of failed attempts to access encrypted communications, governments are shifting from persuasion to coercion—security experts say the risks are too high.

Scania hack Scania hack

A hacker is selling allegedly valuable data stolen from Scania, but the truck maker believes impact is very limited.

Top Cybersecurity Headlines

Russian hackers posed as US State Department staff and convinced targets to generate and give up Google app-specific passwords.

OpenAI has been awarded a $200 million contract for AI capabilities to help the Defense Department address national security challenges.

Hackers have stolen personal and health information belonging to the customers of healthcare organizations served by Episource.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Register

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

SolarWinds, an Austin, Texas-based software maker known for its cost effective IT management solutions, today launched SolarWinds Firewall Security Manager (FSM), a multi-vendor firewall management solution.

FORT MEADE, Maryland, Aug 30, 2012 (AFP) - US Army Private Bradley Manning will go on trial on February 4 next year over charges that he "aided the enemy" by passing a trove of classified documents to WikiLeaks, a judge said Thursday.

IT intrusion tools, sometimes known as lawful interception technologies, are a fixture in the headlines when it comes to privacy. One of the firms offering such abilities to governments and law enforcement is Gamma International, with their FinFisher suite. Researchers from The Citizen Lab have released new data that examines the mobile side of FinFisher, as well as possible locations for its use.

According to IDG News, who spoke to Adam Gowdiak, the founder and CEO of Polish security firm Security Explorations, Oracle was told about the issues currently leaving Java users exposed to attack back in April. In response, US-CERT has come forward in order to urge users and IT teams to disable Java.

NEW DELHI - (AFP) - India ended its ban on bulk text messages Thursday, two weeks after imposing restrictions to halt the spread of threats and rumours that sparked an exodus of migrants fearing attack.

Enterprises Experience 643 “Advanced Malware” Infections Each WeekAccording to FireEye’s most recent threat report released today, organizations are seeing a massive increase in advanced malware that is working its way inside enterprise walls by bypassing traditional IT security defenses.

In my previous SecurityWeek column, I wrote about how information is at the heart of most U.S. bills to secure the Internet. From CISPA to CSA to SECURE IT, all of these bills have one common tactic they are looking to tap: information sharing. My colleagues and I have a more descriptive saying for exactly what this is.

The zero-day in Java that SecurityWeek reported on Monday has gotten worse, as it can be targeted from within the Blackhole Exploit Kit and Metasploit. While this means good guys can use Metasploit as a means to proactive protection, the bad guys now have a way to automate victim collection.

Raynaldo Rivera, a 20 year-old from Tempe, Arizona, surrendered to authorities in Phoenix on Tuesday. Rivera stands accused of being a member of LulzSec and taking part in their attack on Sony last year. If true, he would be the second member of the group arrested in connection to the attack.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Security researchers uncover critical flaws and widespread misconfigurations in Salesforce’s industry-specific CRM solutions.

Cloud Security

Cloud Security

Cloud security startup Circumvent has raised $6 million to develop a network of agents for autonomous prioritization and remediation.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.