Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Radiology Associates of Richmond has disclosed a data breach impacting protected health and personal information. 

With generative AI enabling fraud-as-a-service at scale, legacy defenses are crumbling. The next wave of cybercrime is faster, smarter, and terrifyingly synthetic.

The CitrixBleed 2 vulnerability in NetScaler may expose organizations to compromise even if patches have been applied.

Google has filed a lawsuit against the Badbox 2.0 botnet operators, after identifying over 10 million infected Android devices.

Wiz researchers discovered NVIDIAScape, an Nvidia Container Toolkit flaw that can be exploited for full control of the host machine.

Anne Arundel Dermatology said hackers had access to its systems for three months and may have stolen personal and health information. 

A settlement has been reached in the class action brought by investors against Meta over the Cambridge Analytica incident, but details have not been shared.

Virtual event brings together leading experts, practitioners, and innovators for a full day of insightful discussions and tactical guidance on evolving threats and real-world defense strategies in cloud security.

Cybersecurity startup Empirical Security has raised $12 million in seed funding for its vulnerability management platform. 

Karen Serobovich Vardanyan pleaded not guilty to charges related to his alleged role in the Ryuk ransomware operation.

Deployed on mobile devices confiscated by Chinese law enforcement, Massistant can collect user information, files, and location.

People on the Move

Kenna Security co-founder Ed Bellis has joined Empirical Security as Chief Executive Officer.

Robert Shaker II has joined application security firm ActiveState as Chief Product and Technology Officer.

MorganFranklin Cyber has promoted Nick Stallone and Ferdinand Hamada into newly created roles.

Jessica Newman has joined Sophos as General Manager of Global Cyber Insurance.

Breach and attack simulation solutions provider AttackIQ has appointed Pete Luban as Field Chief Information Security Officer.

More People On The Move
Badbox 2 botnet lawsuit by Google Badbox 2 botnet lawsuit by Google

Google has filed a lawsuit against the Badbox 2.0 botnet operators, after identifying over 10 million infected Android devices.

Oracle patches Oracle patches

Oracle’s July 2025 Critical Patch Update contains 309 security patches that address approximately 200 unique CVEs.

UNFI Cyberattack UNFI Cyberattack

Cyberattack disrupted UNFI’s operations in June; company estimates $50–$60 million net income hit but anticipates insurance will cover most losses.

Top Cybersecurity Headlines

Chinese hacking group Salt Typhoon targeted a National Guard unit’s network and tapped into communications with other units.

DragonForce says it stole more than 150 gigabytes of data from US department store chain Belk in a May cyberattack.

A vulnerability affecting systems named End-of-Train and Head-of-Train can be exploited by hackers to cause trains to brake. 

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

This online session will explore resilience planning in response to geopolitical tensions and help CISOs navigate the current state of federal cybersecurity initiatives.

Register

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

A Vulnerability Management (VM) program is commonly defined as the “cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities" . According to Gartner’s report , the purpose of the remediation phase is to harden the environment, prior to eliminating the vulnerability, by using desktop and network security tools, while the mitigation phase role is to eliminate the root causes of the vulnerability by applying a patch to the system.

On Tuesday, prosecutors asked a federal judge to delay sentencing for Hector Xavier Monsegur, better known to some as Sabu, for his role as a cooperating witness. The curt agreed, delaying sentencing for six months.

NEW DELHI - (AFP) - Twitter has agreed to remove six fake accounts which purport to be Prime Minister Manmohan Singh's following a request from the Indian government, the premier's spokesman said on Thursday. The government asked the micro-blogging website to remove the accounts on the grounds that they misrepresented the prime minister and risked increasing ethnic or religious tension.

Seoul - (AFP) - South Korea's Constitutional Court on Thursday effectively killed off a law which bans Internet users from using false IDs, ruling it a breach of freedom of expression. Authorities in 2007 started enforcing the law aimed at curbing the country's notorious cyber-bullying by preventing Internet users from hiding behind false IDs when they write postings on websites. Eight judges in a unanimous decision ruled the law is unconstitutional.

The University of South Carolina (USC) is notifying some 34,000 people after a system intrusion was detected on a computer used by the College of Education. The breach was discovered in June, but the notifications are being delivered in order to allow those impacted to watch their credit reports.

LOS ANGELES - (AFP) - An armed man was arrested in the western United States on Tuesday for allegedly sending an email that threatened President Barack Obama, a justice official told AFP. "He had sent an emailed threat against the president," said Emily Langlie, a spokeswoman for the US Attorney's Office in Washington state, confirming that the man was detained at a suburban apartment in Seattle.

The Department of Homeland Security has warned that encrypted traffic sent to and from RuggedCom network products can be decrypted by malicious attackers.

Apple patched a vulnerability in its remote desktop product where the connection isn't being encrypted correctly. This may result in information disclosure, Apple said in its advisory.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

RevEng.ai has raised $4.15 million in seed funding for an AI platform that automatically detects malicious code and vulnerabilities in software.

Cloud Security

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.