Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Aflac said that it’s in the early stages of a review of the incident, and so far is unable to determine the total number of affected individuals.

Noteworthy stories that might have slipped under the radar: China’s Salt Typhoon targeted Viasat, Washington Post emails compromised in hack, Rowhammer attack named Crowhammer.

Cloudflare has blocked yet another record-breaking DDoS attack, which delivered the equivalent of 9,000 HD movies in just 45 seconds.

The Godfather Android trojan uses on-device virtualization to hijack legitimate applications and steal users’ funds.

Threat actors are exploiting a critical-severity vulnerability in Motors theme for WordPress to change arbitrary user passwords.

WhatsApp told SecurityWeek that it linked the exploited FreeType vulnerability CVE-2025-27363 to a Paragon exploit.

A threat actor is abusing Cloudflare Tunnels for the delivery of a Python loader as part of a complex infection chain.

Krispy Kreme is sharing more information on the data breach resulting from the ransomware attack targeting the company in 2024. 

Personal data of former and current council workers, including election staff, may have been accessed by hackers.

Israel-linked Predatory Sparrow hackers torched more than $90 million at Iran’s largest cryptobank as Israel-Iran cyberwar escalates.

Trend Micro and ReversingLabs uncovered over 100 GitHub accounts distributing malware embedded in open source hacking tools.

People on the Move

Checkmarx has appointed Scott Gainey as Chief Marketing Officer.

Jason Hogg has been named Executive Chairman of CYPFER.

HUB Cyber Security has appointed former PayPal and American Express executive Paul Parisi as its Global Chief Revenue Officer.

Cloud security startup Upwind has appointed Rinki Sethi as Chief Security Officer.

SAP security firm SecurityBridge announced the appointment of Roman Schubiger as the company’s new CRO.

More People On The Move
WhatsApp Zero-Day Exploit WhatsApp Zero-Day Exploit

WhatsApp told SecurityWeek that it linked the exploited FreeType vulnerability CVE-2025-27363 to a Paragon exploit.

Encryption backdoor debate Encryption backdoor debate

After decades of failed attempts to access encrypted communications, governments are shifting from persuasion to coercion—security experts say the risks are too high.

Scania hack Scania hack

A hacker is selling allegedly valuable data stolen from Scania, but the truck maker believes impact is very limited.

Top Cybersecurity Headlines

Russian hackers posed as US State Department staff and convinced targets to generate and give up Google app-specific passwords.

OpenAI has been awarded a $200 million contract for AI capabilities to help the Defense Department address national security challenges.

Hackers have stolen personal and health information belonging to the customers of healthcare organizations served by Episource.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Register

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

There is a saying in the InfoSec world – you can’t patch human stupidity. It isn’t hard to prove that statement depending on the situation, but a new account on Twitter is making the task a simple one. The account, @NeedADebitCard, is re-tweeting people who are openly declaring their intent to share the wealth (what little of it there is) by posting pictures of their debit and credit cards for all to see.

Twitter, the ever popular, privacy respecting social network, released their first transparency report this week, after taking a cue from Google. The report isn’t glowing, but it is a solid start and another view of how a major Internet portal deals with protecting a user’s rights.

According to research from Symantec and Sophos, the Blackhole exploit kit has been upgraded with some new features recently. The latest revision includes a payload that targets an unpatched vulnerability in Microsoft XML Core Services , and new JavaScript that addresses propagation issues.

Sourcefire CEO John Burris Takes Medical Leave of AbsenceCybersecurity solutions provider Sourcefire, Inc. today said that its Chief Executive Officer, John Burris, has taken a medical leave of absence to undergo a series of treatments for colon cancer.

According to newly released data from International Data Corporation (IDC), security appliance vendors enjoyed strong continued growth during the first quarter of this year, as evidenced by recent numbers coming from the technology market research firm.

A new whitepaper from McAfee takes a look at the emergence of hacktivism and the implications of how digital protest movements may evolve in the future. The report, titled ‘Hacktivism: Cyberspace has become the new medium for political voices’, was authored by Francois Paget, a senior malware research engineer at McAfee Labs in France. The paper traces hacktivism from the first uses of the word to the people launching politically-motivated distributed denial-of-service (DDoS) attacks under the Anonymous label.

Anonymous Looks to Save the Planet by Targeting ExxonMobil, Shell and BP Last week, and continuing into the weekend, Anonymous targeted ExxonMobil and claimed to have compromised company data during Op SaveTheArctic. The attack was in response to environmental concerns, and it isn’t the first time Exxon has come under the gun with regards to the faceless hacking collective.

On June 24, with little fanfare, Stuxnet died. The malware exposed as being a government project aimed at slowing Iran’s nuclear intiatives, stopped replicating. Despite a reported link to a plant shutdown in Iran, the state run media called Stuxnet a failure.

Researchers at the University of Texas at Austin have demonstrated how the GPS signals of an unmanned aerial vehicle (UAV), or drone, can be hijacked by an outside source.

For many years network security has taken something of a primarily reactive, top-down mentality to dealing with threats. For example, when a new malicious widget emerges, then the security industry spins up new anti-widget products to stop them. These technologies obviously have their place, and few of us would consider securing a network without IPS and anti-virus capabilities. However, most organizations lack a comparable bottoms-up strategy to proactively identify all traffic and determine if it is appropriate.

According to a recently released report coming from the DHS-managed Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), U.S. companies that operate control systems associated with critical infrastructure have experienced a spike in what ICS-CERT calls “cyber incidents” in recent years.

Kaspersky Lab Discovers New Mac OS X Backdoor Variant Used in Targeted AttacksResearchers from Russian security firm Kaspersky Lab today said they have discovered a new APT campaign that is using a new Mac OS X backdoor variant targeted at Uyghur activists.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Security researchers uncover critical flaws and widespread misconfigurations in Salesforce’s industry-specific CRM solutions.

Cloud Security

Cloud Security

Cloud security startup Circumvent has raised $6 million to develop a network of agents for autonomous prioritization and remediation.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.