Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Microsoft says roughly 8.5 million Windows devices were impacted by the faulty software update from CrowdStrike, and published a tool to help admins through the recovery process.

CrowdStrike on Saturday provided technical information and remediation guidance to help organizations impacted by the faulty software update that trigged massive IT outages across the globe on Friday.  

CrowdStrike says a routine sensor configuration update pushed to Windows OS triggered a logic error that blue-screened computers worldwide.

Judge dismissed SEC lawsuit charging SolarWinds and CISO Timothy Brown with hiding security problems before and after the SUNBURST supply chain compromise.

SonicWall warns that a simple GET request is enough to exploit a recent Splunk Enterprise vulnerability.

Over a dozen tech and cloud companies have created a new coalition for advancing security measures for AI.

Noteworthy stories that might have slipped under the radar: threats and risks to 2024 Summer Olympics, cybersecurity funding soars, Cellebrite hacked Trump shooter’s phone. 

The personal and health information of 12.9 million was stolen in a ransomware attack at Australian digital prescription services provider MediSecure.

SolarWinds has released patches for 13 vulnerabilities in Access Rights Manager, including eight critical bugs.

Organizations worldwide are reporting major outages due to Windows system crashes caused by a bad CrowdStrike update.

The Pwn2Own hacking competition is moving to Ireland and $300,000 is being offered for a zero-click exploit against WhatsApp. 

People on the Move

SaaS security company AppOmni has hired Joel Wallenstrom as its General Manager.

FTI Consulting has appointed Brett Callow as Managing Director in its Cybersecurity & Data Privacy Communications practice.

Mobile security firm Zimperium has welcomed David Natker as its VP of Global Partners and Alliances.

CISA has appointed Jeff Greene as Executive Assistant Director for Cybersecurity and Trent Frazier as Assistant Director for Stakeholder Engagement.

David Chétrit has been appointed the CEO of Kudelski Security.

More People On The Move
CrowdStrike IT Recovery Tool CrowdStrike IT Recovery Tool

Microsoft says roughly 8.5 million Windows devices were impacted by the faulty software update from CrowdStrike, and published a tool to help admins through the recovery process.

CrowdStrike Remediation Information CrowdStrike Remediation Information

CrowdStrike on Saturday provided technical information and remediation guidance to help organizations impacted by the faulty software update that trigged massive IT outages across the globe on Friday.  

CrowdStrike Remediation Information CrowdStrike Remediation Information

CrowdStrike says a routine sensor configuration update pushed to Windows OS triggered a logic error that blue-screened computers worldwide.

Top Cybersecurity Headlines

Organizations worldwide are reporting major outages due to Windows system crashes caused by a bad CrowdStrike update.

Teixeira, who was part of the 102nd Intelligence Wing at Otis Air National Guard Base in Massachusetts, worked as a cyber transport systems specialist.

Researchers show how the Port Shadow technique against VPNs can allow MitM attacks, enabling threat actors to intercept and redirect traffic. 

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how to utilize tools, controls, and design models needed to properly secure cloud environments.

Register

The leading industrial cybersecurity conference for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 25-26, Ritz-Carlton, Half Moon Bay, CA]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s annual cloud security virtual summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs.

Learn More

SecurityWeek’s Identity & Zero Trust Strategies Summit is laser focused on helping organizations to level up their Identity and Zero Trust security strategies.

Learn More

Vulnerabilities

Cybercrime

The industrialized hackers are intent on one goal--making money. They also know the basic rules of the business of increasing revenues while cutting costs. (Part IV In a Series on Cybercrime.

Ridge Global names former US-CERT Director and former Director of the National Cyber Security Division at the Department of Homeland Security to Board of AdvisorsRidge Global, the security and risk management services company founded by Tom Ridge, nation's first secretary of Homeland Security and former governor of Pennsylvania, today announced is has named Amit Yoran, CEO of Netwitness Corporation, to the company's board of advisors.

Company Announces New Solution for Cloud Risk Assessment, Monitoring and Assurance Target Compliance, Security and Threats in Private, Public and Hybrid Cloud Environments As Global 2000 private and large public sector organizations face increasing compliance and security demands, they are virtualizing more of their IT operations through private and public cloud environments. In this transition, organizations still need to "gracefully lose control" without undermining governance, risk management and compliance requirements.

Adobe today announced its new Acrobat X Family of products, which includes Adobe Reader X as well as Acrobat X Suite, Acrobat X Pro, and Acrobat X Standard. In the new release, Adobe is adding an entirely new security strategy by introducing a new “Protected Mode” in Acrobat Reader. Announced this past summer, Protected Mode utilizes "sandboxing" technology based on Microsoft’s “Practical Windows Sandboxing technique ” – a method of isolating the application from the rest of the operating system...

Vulnerability Could Allow Attacker to Execute Arbitrary Code or Cause a denial-of-service ConditionRIM has released a security advisory to address a security issue in the BlackBerry Attachment Service component of the BlackBerry Enterprise Server. According to RIM, the vulnerability could allow a malicious individual to cause buffer overflow errors, leading to a Denial of Service (DoS) condition or execution of arbitrary code on the computer that the BlackBerry Attachment Service runs on.

GE today announced the acquisition of Australia-based data migration and SCADA simulation specialists, Opal Software. Opal Software supplies professional engineering services and SCADA and DMS software products to electricity, water and gas utilities. The company’s data migration capabilities help clients to switch quickly between multiple platforms.

Organized crime enterprise known as the Mirzoyan-Terdjanian, fleeced the health care system through a wide-range of money making criminal fraud schemesThe FBI reported this week that seventy-three people, including a number of alleged members and associates of an Armenian-American organized crime enterprise, were charged in indictments with various health care fraud-related crimes involving more than $163 million in fraudulent billing.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

CISA says a SILENTSHIELD red team assessment found gaping holes in the security posture of a federal civilian executive branch organization.

Cloud Security

Cloud Security

Join us as we explore the latest trends in the world of SaaS security, cyberattacks against cloud infrastructure, data security posture management (DSPM), and...