Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Misconfigured permissions in Google’s Gerrit code collaboration platform could have led to the compromise of ChromiumOS and other Google projects.

Citrix has released patches for critical- and high-severity vulnerabilities in NetScaler and Secure Access Client and Workspace for Windows.

Qualys has disclosed two Linux vulnerabilities that can be chained for full root access, and CISA added a flaw to its KEV catalog.

Adopting a layered defense strategy that includes human-centric tools and updating security components.

OpenAI has been awarded a $200 million contract for AI capabilities to help the Defense Department address national security challenges.

Google has released a Chrome 137 update to resolve two memory bugs in the browser’s V8 and Profiler components.

Veeam and BeyondTrust have resolved several vulnerabilities that could be exploited for remote code execution.

Hackers have stolen personal and health information belonging to the customers of healthcare organizations served by Episource.

Researchers identify a previously unknown ClickFix variant exploiting PowerShell and clipboard hijacking to deliver the Lumma infostealer via a compromised travel site.

GreyNoise warns of a spike in exploitation attempts targeting a two-year-old vulnerability in Zyxel firewalls.

Google is warning insurance companies that Scattered Spider appears to have shifted its focus from the retail sector. 

People on the Move

Jason Hogg has been named Executive Chairman of CYPFER.

HUB Cyber Security has appointed former PayPal and American Express executive Paul Parisi as its Global Chief Revenue Officer.

Cloud security startup Upwind has appointed Rinki Sethi as Chief Security Officer.

SAP security firm SecurityBridge announced the appointment of Roman Schubiger as the company’s new CRO.

Cybersecurity training and simulations provider SimSpace has appointed Peter Lee as Chief Executive Officer.

More People On The Move
OpenAI DoD cyber defense contract OpenAI DoD cyber defense contract

OpenAI has been awarded a $200 million contract for AI capabilities to help the Defense Department address national security challenges.

Episource data breach Episource data breach

Hackers have stolen personal and health information belonging to the customers of healthcare organizations served by Episource.

Insurance sector targeted by Scattered Spider Insurance sector targeted by Scattered Spider

Google is warning insurance companies that Scattered Spider appears to have shifted its focus from the retail sector. 

Top Cybersecurity Headlines

According to reports, the US Department of Justice will assess whether the deal would harm competition in the cybersecurity market.

A cybersecurity incident at WestJet resulted in users experiencing interruptions when accessing the company’s application and website.

Industry professionals comment on the Trump administration’s new executive order on cybersecurity. 

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Register

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

Apple has said they’ve fixed a business logic flaw that allowed consumers to bypass In-App Purchasing (IAP) on iOS. In a developer note, Apple calls the bypass a vulnerability and offers application developers guidance on addressing the issue.

Internet security software maker AVG Technologies, on Friday said that it has moved its United States headquarters to San Francisco, California. Previously, the Netherlands-based company maintained its U.S. headquarters in Chemlsford, Massachusetts, just outside of Boston.

In late May, ICS-CERT published a security guide for organizations responsible for maintaining the nation’s critical infrastructure. The guide focuses on intrusion detection and mitigation strategies, but on Thursday it was updated to include additional information.

A telecommunications company in California, believed to be Credo – a company that resells wireless spectrum – is being sued after they challenged one of the FBI’s ultra-secret National Security Letters (NSL) and its accompanying gag order.

As an interesting follow up to a recent columm by Alan Wlasuk on on Cyber Extortion last week, comes this recent news out of Maine. John Bryan Villegas, 21, of Kittery, Maine, was arrested Tuesday and appeared in federal court in New Hampshire. Villegas is charged with one count of engaging in computer intrusion involving extortion and one count of making extortionate interstate threats.

On Thursday, the U.S, Department of Justice announced the arrest of Dmitry Olegovich Zubakha, 25, of Moscow. Zubakha was arrested in Cyprus on an international warrant, issued after he was indicted last year for a series of DDoS attacks against three of the Web’s largest online retailers.

How many times have you seen a vendor site or proposal say that someone supports “best of breed” security, or that a company honors “best practice”?I see it all the time, and most of the time it makes me question the integrity and wisdom of the organization.

Last month, a spotlight was put on a MySQL authentication bypass vulnerability that gave hackers a one out of 256 chance to gain access to the database regardless of whether or not they entered the wrong password. Versions of MariaDB were also affected by the bug, which Rapid7's HD Moore at the time called "tragically comedic." However, application firm Coverity said the situation also presents a learning opportunity for developers.

Oracle unveiled Oracle Identity Management 11g Release 2 today, the latest version in its Identity Management platform. With Oracle Identity Management 11g, organizations can securely make the shift to cloud computing and rolling out mobile and social infrastructures, Oracle said. With so many applications living on mobile devices and in the cloud, it's important these applications get the same kind of management and security tools as the on-premise systems do.

By Including The Counterattack in IT Security Strategy Planning, Security Teams Can Quickly Change The Dynamics of a Cyber Attack...Any competent military commander knows that when put in a defensive position, defense forces are never be able to withstand long and sustained offensive attacks. The assumption that the front line of defense will eventually be breached is also true in the realm of the information security battle of defense.

What Should Financial Services Firms Look for to Ensure a Security Technology Can Address Their Needs?Perhaps no industry has a greater need for network and data security than the financial services industry. Widely considered to be ‘critical infrastructure,’ not only are banking and financial market networks handling the life savings of individuals, but the lifeblood of the global economy.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Security researchers uncover critical flaws and widespread misconfigurations in Salesforce’s industry-specific CRM solutions.

Cloud Security

Cloud Security

Cloud security startup Circumvent has raised $6 million to develop a network of agents for autonomous prioritization and remediation.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.