Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Google releases OSV-SCALIBR, an open source library for software composition analysis and file system scanning.

The US Treasury has sanctioned two individuals and four entities involved in the North Korean fake IT worker scheme.

Industry professionals comment on the Biden administration’s new executive order on cybersecurity. 

Three vulnerabilities in SimpleHelp could allow attackers to compromise the remote access software’s server and the client machine.

Cisco has unveiled AI Defense, a solution designed to help organizations protect development and use of AI applications. 

Microsoft researchers catches Russia’s Star Blizzard hackers spear-phishing with QR codes and WhatsApp group chats.

New research shows that over 4 million systems on the internet, including VPN servers and home routers, are vulnerable to attacks due to tunneling protocol flaws.

Authentication solutions provider Wultra has raised €3 million (~$3.1 million) for its post-quantum technology.

Cannabis retailer Stiiizy says hackers stole the personal information of 380,000 consumers from one of its vendors.

North Korea-linked Lazarus Group is targeting freelance software developers to compromise the supply chain.

Both human and machine identities occupy a unique position: they are simultaneously the foundation of cybersecurity and its weakest link.

People on the Move

Karl Triebes has joined Ivanti as Chief Product Officer.

Steven Hernandez has joined USAID as CISO and Deputy CIO.

Data security and privacy firm Protegrity has named Michael Howard as its CEO.

Anand Ramanathan has been appointed as Chief Product Officer at Deepwatch.

Managed security platform provider Deepwatch has appointed Sammie Walker as CMO.

More People On The Move
Healthcare data breach Healthcare data breach

In 2024 organizations informed the US government about 585 healthcare data breaches affecting a total of nearly 180 million user records.

CISA CISA

Jen Easterly hopes CISA is allowed to continue its election-related work under new leadership despite “contentiousness” around that part of its mission.

Fortinet vulnerability exploited Fortinet vulnerability exploited

Fortinet patches critical vulnerabilities, including a zero-day that has been exploited in the wild since at least November 2024. 

Top Cybersecurity Headlines

Patch Tuesday: Microsoft’s January Patch Tuesday rollout includes fixes for 160 security defects, the largest number of CVEs addressed in any single month since at least 2017.

Attackers are exploiting a critical vulnerability in Aviatrix Controller to execute arbitrary code in AWS cloud environments.

Chinese cyberspies targeted offices dealing with foreign investments and sanctions in the recent US Treasury hack. 

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Explore trends and technologies that will shape the future of cybersecurity. Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 2025, Stay Tuned]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.(February 26, 2025)

Learn More

Supply Chain Security Summit
Join us as we explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects. (March 19, 2025)

Learn More

Vulnerabilities

Cybercrime

In an effort to help users dodge mobile malware targeting the iPhones, BlackBerrys and Android devices, McAfee this week shared some tips and strategies on the subject of mobile threats. But just what are those threats, and how are attackers using them to make money?

Atlanta-based Damballa released Failsafe 5.0 this week, the latest edition of the company’s cyber threat detection and mitigation solution. Adding new cloud-based capabilities, this latest update promises to better track “Internet aware” malware and other threats.

RSA is rolling out a number of improvements to its DLP suite, designed to provide organizations with more control and improved detection when it comes to managing data loss across the network and managing connected devices, including tablets and smartphones. In addition, the enhancements offer visibility and the ability for organizations to make more educated decisions around security and governance.

A server at Virginia Commonwealth University, containing files with personal information on current and former VCU and VCU Health System faculty, staff, students and affiliates, was breached in October, during a two step attack. As a result, 176, 567 individuals may have been exposed to personal data theft.

Researchers from F-Secure have observed a piece of malware carrying an unusual piece of luggage – a valid code-signing certificate belonging to the government of Malaysia.Code-signing certificates are meant to demonstrate the authenticity of a particular piece of software, making them potentially a hot commodity for people looking to dupe security mechanisms.

Huawei Acquires Symantec's Stake in Huawei Symantec Hong Kong Joint Venture China based Huawei Technologies said today that it would acquire Symantec's 49 percent stake in Huawei Symantec Technologies, the Hong Kong-based joint venture established by Huawei and Symantec in 2008 that provides IT security, storage and systems management solutions.

Supercomputer maker, Cray Inc., today announced that the University of Illinois' National Center for Supercomputing Applications (NCSA) awarded the company a contract to build a massive supercomputer for the National Science Foundation's Blue Waters project.

Red Hat Partners with SAIC to Deliver Open Source Cloud Computing Solutions for U.S. Department of DefenseThe U.S. Department of Defense will soon be running more projects on open source cloud computing technologies, thanks to a partnership between Red Hat and Science Applications International Corporation (SAIC), a technology contractor with many government and defense agency customers.

Today IBM launched a cloud-based mobile security offering designed to help organizations better secure smartphones and tablet devices in the workplace and protect against the latest mobile threats.The new service, “IBM Hosted Mobile Device Security Management,” utilizes the Junos Pulse Mobile Security Suite from Juniper Networks as the underlying protection and device management technology.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Google releases OSV-SCALIBR, an open source library for software composition analysis and file system scanning.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.