Now on Demand: Threat Detection and Incident Response (TDIR) Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Only one of seven bills aimed at preventing AI’s penchant to discriminate when making consequential decisions — including who gets hired, money for a home or medical care — has passed.

Backdoored JAVS courtroom recording and management software installer puts thousands at risk of complete takeover.

Averson secures seed funding to build technology that uses AI to identify cloud security weaknesses and counter cyberattacks.

Noteworthy stories that might have slipped under the radar: Chinese repair ships might be spying on undersea communications, spyware found at hotel check-ins, UK not ready for China threat.

Exploited in the wild, Chrome vulnerability CVE-2024-5274 is a high-severity flaw described as a type confusion in the V8 JavaScript and WebAssembly engine.

U.S. intelligence agencies are scrambling to embrace the AI revolution, believing they’ll be smothered by exponential data growth as sensor-generated surveillance tech further blankets the planet.

MITRE has shared information on how China-linked hackers abused VMware for persistence and detection evasion in the recent hack.

Bolster has raised $14 million in Series B funding for technology integrations for its AI-powered phishing protection platform.

The Association of California School Administrators (ACSA) is informing nearly 55,000 individuals that they have been impacted by a ransomware attack.

Under the new U.S. Cyber Trust Mark Initiative, manufacturers can affix the label on their products if they meet federal cybersecurity standards.

Attackers are getting more sophisticated, better armed, and faster. Nothing in Rapid7’s 2024 Attack Intelligence Report suggests that this will change.

People on the Move

Wendy Zheng named as CFO and Joe Diamond as CMO at cyber asset management firm Axonius.

Intelligent document processing company ABBYY has hired Clayton C. Peddy as CISO.

Digital executive protection services provider BlackCloak has appointed Ryan Black as CISO.

Joe Levy has been appointed Sophos’ permanent CEO, and Jim Dildine has been named the company’s CFO.

CISA executive assistant director for cybersecurity Eric Goldstein is leaving the agency after more than three years.

More People On The Move
CVE-2024-5274 CVE-2024-5274

Exploited in the wild, Chrome vulnerability CVE-2024-5274 is a high-severity flaw described as a type confusion in the V8 JavaScript and WebAssembly engine.

As chatbots become more adventurous, the dangers will increase.

CISA CISA

CISA has added CVE-2023-43208, an unauthenticated remote code execution vulnerability, to its KEV catalog. 

Top Cybersecurity Headlines

Only one of seven bills aimed at preventing AI’s penchant to discriminate when making consequential decisions — including who gets hired, money for a…

Backdoored JAVS courtroom recording and management software installer puts thousands at risk of complete takeover.

Averson secures seed funding to build technology that uses AI to identify cloud security weaknesses and counter cyberattacks.

Noteworthy stories that might have slipped under the radar: Chinese repair ships might be spying on undersea communications, spyware found at hotel check-ins, UK…

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 25-26, Ritz-Carlton, Half Moon Bay, CA]

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Learn More

Designed for senior level cybersecurity leaders to discuss, share and learn innovative information security and risk management strategies, SecurityWeek’s CISO Forum, will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit dives into Threat hunting tools and frameworks, and explores the value of threat intelligence data in the defender’s security stack.

Learn More

Vulnerabilities

Cybercrime

Securing the Extended EnterpriseAs corporations expand their reliance on the Internet and technology to conduct business, most work diligently to reduce their exposure to attack. Their efforts are focused primarily on protecting their enterprise assets, but could they be missing a very important aspect of their attack surface…. the extended enterprise?

Signature Based Anti-Virus Test Results - Vendors Struggle to Keep up with ThreatsThe most popular signature-based antivirus (AV) solutions detect on average less than 19% of malware threats, according to a new report released today by IT security vendor Cyveillance. However, that detection rate increases to 61.7% after 30 days, although even this rate could hardly be seen as comforting.

Security solutions provider Rapid7 has launched the latest version of its vulnerability management solution, NeXpose, which will help local governments and private enterprises adhere to Federal Information Processing Standard (FIPS) 140-2 Certification requirements.

Jailbroken iPhones - a Risk in the EnterpriseLast week’s ruling by the Library of Congress's Copyright Office giving a legal green light to iPhone and iPad users who want to download non-Apple-approved apps may make corporate security managers nervous if these Apple products are part of their mobile device portfolio – but a smartphone security company has come up with a counter-measure that will at least bring the risk level down to what it was before the ruling.

Solace Systems and Layer 7 Technologies Team Up on Scalable Messaging for SOA and Cloud EnvironmentsSolace Systems and Layer 7 Technologies have announced a joint venture in which the companies will integrate their technologies to offer scalable and secure SOA and cloud based solutions to their customers.

Information security technology vendor Perimeter E-Security has decided to expand its R&D initiatives by opening a new innovation center in Boston, MA. The company plans to expand the new research group for the next two years. Perimeter E-Security offers information security and compliance products to enterprise users including secure messaging services, firewall services and anti-virus and spam detection services.

Mumba Botnet Infects over 55,000 Computers around the worldAVG Technologies issued a report this week that identified a global network of 55,000 malware-infected computers infected by the Mumba botnet.AVG researchers discovered that the Mumba botnet, named after attributes indentified on the server, has stolen more than 60GB of data from users including credentials from social networking Web sites, banking account details, credit card numbers and emails.

MobileIron, a provider of multi-OS smartphone management solutions, today announced a $16 million Series C financing round. Just under a year ago the company raised $11 million in a Series B funding round.The new capital will be used to support business expansion and investment in innovation.Foundation Capital joined existing investors Norwest Venture Partners, Sequoia Capital, and Storm Ventures. The investment was led by Paul Holland, general partner with Foundation Capital.

Biometric Authentication for iPhone AppsPerSay, a provider of Voice Biometric solutions, today announced the availability of its VocalPassword functionality for iPhone, iPad, and iPod Touch applications. The new capability can replace existing login processes and use technology that relies on the biometric power of voice to verify identity.

Mobile Device Management Security a Top ConcernA recent survey conducted by security firm McAfee has revealed that around 76 percent organizations are planning to implement at least one key mobility initiative to improve their operations within the next 6 to 12 months.

"Mariposa botnet" - Butterfly botnet kit Author Arrested“Iserdo,” the confirmed author of the Butterfly botnet kit, was arrested recently in Maribor, Slovenia, by Slovenian authorities working with the FBI. The 23-year-old master hacker known only by his Internet handle is allegedly the mastermind behind the code used to build the Mariposa botnet, which has compromised millions of systems worldwide. He is currently free on bail.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

A critical vulnerability tracked as CVE-2024-34359 and dubbed Llama Drama can allow hackers to target AI product developers.

Cloud Security

Cloud Security

Google is invoking the 'monoculture' word in response to a scathing U.S. government report on Microsoft's inadequate cybersecurity practices.