Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

According to reports, the US Department of Justice will assess whether the deal would harm competition in the cybersecurity market.

The Archetyp Market drug marketplace has been targeted by law enforcement in an operation involving takedowns and arrests. 

Asheville Eye Associates says the personal information of 147,000 individuals was stolen in a November 2024 data breach.

The Indian car sharing marketplace Zoomcar learned that its systems were hacked after a threat actor contacted employees. 

The KillSec ransomware group has stolen hundreds of gigabytes of data from Ireland-based eyecare technology company Ocuco.

The emerging Anubis ransomware becomes a major threat, permanently deleting user files and making recovery impossible.

A strong AI deployment starts with asking the right questions, mapping your risks, and thinking like an adversary — before it’s too late.

Three high-severity Tenable Agent vulnerabilities could allow users to overwrite and delete files, or execute arbitrary code, with System privileges.

A cybersecurity incident at WestJet resulted in users experiencing interruptions when accessing the company’s application and website.

Noteworthy stories that might have slipped under the radar: Cloudflare outage not caused by cyberattack, Dutch police identified 126 users of Cracked.io, the Victoria’s Secret cyberattack has cost $10 million. 

Threat actors have abused the TeamFiltration pentesting framework to target over 80,000 Entra ID user accounts.

People on the Move

Cloud security startup Upwind has appointed Rinki Sethi as Chief Security Officer.

SAP security firm SecurityBridge announced the appointment of Roman Schubiger as the company’s new CRO.

Cybersecurity training and simulations provider SimSpace has appointed Peter Lee as Chief Executive Officer.

Orchid Security has appointed a new Chief Product Officer and three advisors.

Kaseya has appointed Rania Succar as Chief Executive Officer.

More People On The Move
WestJet cyberattack WestJet cyberattack

A cybersecurity incident at WestJet resulted in users experiencing interruptions when accessing the company’s application and website.

Trump Cybersecurity Executive Order Trump Cybersecurity Executive Order

Industry professionals comment on the Trump administration’s new executive order on cybersecurity. 

Mitel MiCollab vulnerabilities Mitel MiCollab vulnerabilities

Mitel has announced patches for a MiCollab path traversal vulnerability that can be exploited remotely without authentication.

Top Cybersecurity Headlines

AI-generated voice deepfakes have crossed the uncanny valley, fueling a surge in fraud that outpaces traditional security measures. Detection technology is racing to keep up.

The new attack technique uses smartwatches to capture ultrasonic covert communication in air-gapped environments and exfiltrate data.

Interpol has announced a crackdown on infostealer malware in Asia as part of an effort called Operation Secure.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Register

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

Visa said on Tuesday that it is rolling out a new service for acquirers and their merchants that will help to better secure payment card data. The service, Visa Merchant Data Secure with Point-to-Point Encryption, will be fully available to customers by early 2013.

In response to the code required to crack MS-CHAPv2 sessions being published to the Web, Microsoft has issued a security advisory for organizations that may need guidance. However, the software giant has made it clear that while the issue is worth addressing, it is not something they plan to address with a security update.

NEW DELHI - (AFP) - India has demanded social networking websites take down provocative messages and blocked some online content after anonymous threats sparked an exodus of migrants from southern cities. Tens of thousands of workers and students from the remote northeast region returned home last week from Bangalore, Mumbai and other cities fearing attacks from Muslims in reprisal for recent ethnic clashes in the state of Assam.

PARIS - (AFP) - Wireless routers for homes and offices could be knitted together to provide a communications system for emergency responders if the mobile phone network fails, German scientists reported on Monday. In many countries, routers are so commonplace even in medium-sized towns that they could be used by fire services, ambulance and police if cellphone towers and networks are down or overwhelmed by people caught up in an emergency, they say.

The Securities and Exchange Commission (SEC) on Friday said that it took actions to halt what they are saying was a $600 million Internet-based Ponzi scheme. The SEC said that it took “emergency actions” and froze assets controlled by Paul Burks of Lexington, North Carolina and his company, Rex Venture Group, operator of the website ZeekRewards.com.

A recent study from Four Points by Sheraton shows that of their business travelers, a majority carry three to four devices with them, which are both for business and personal use. While the hotel’s study was aimed at how well they serve business travelers, it offers a different perspective on BYOD risk.

Defense contractor General Dynamics today said that it would acquire Fidelis Security Systems, a provider of network security tools that provide real-time network visibility, analysis and control. The terms of the deal have not been disclosed, but the acquisition has been approved by the boards of both companies and is expected to close in the third quarter of 2012.

You’ve handed over controls to a third-party, so how do you implement the right levels of security in a cloud environment, trust the provider to take care of the rest, and still meet compliance initiatives?

San Francisco, California-based NCC Group today said that has acquired Intrepidus Group, a security research and testing services provider focused on the mobile sector. NCC Group offers Enterprise Risk Management solutions and other services including software escrow, IT assurance with verification and validation testing, security testing for SaaS applications, due diligence for mergers & acquisitions and more.

Apple has responded to a French iOS hacker’s discovery of a spoofing problem within iOS’ implementation of SMS. If abused, there is a serious potential for Phishing attacks on the devices, but Apple seems to be passing the buck somewhat.

Over the weekend, chipmaker AMD had a bit of a problem when a group known as R00tbeer targeted their WordPress installation and managed to deface the domain as well as walk away with the SQL file used to manage the content management system (CMS).

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Security researchers uncover critical flaws and widespread misconfigurations in Salesforce’s industry-specific CRM solutions.

Cloud Security

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.