CONFERENCE Cyber AI & Automation Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Noteworthy stories that might have slipped under the radar: ENISA and NCSC release cybersecurity reports, abuse of Cloudflare services, FBI warns of gen-AI enabling fraud. 

Data privacy solutions provider Ethyca has raised $10 million in a funding round led by Aspenwood Ventures and AVP.

SonicWall has released patches for multiple high-severity flaws in the SMA100 SSL-VPN secure access gateway.

Atrium Health has notified the HHS of a data breach impacting 585,000 individuals, and the incident may be related to online tracking.

Google has announced the open source availability of Vanir, a patch validation tool for Android platform developers.

WatchTowr has published proof-of-concept (PoC) code for an unpatched vulnerability in the Mitel MiCollab enterprise collaboration platform.

A California teen suspected of being a Scattered Spider member left a long trail of evidence and even used an FBI service to launder money.

A critical directory traversal vulnerability in the SailPoint IdentityIQ IAM platform exposes restricted files to attackers.

Japanese device maker confirms zero-day router exploitation and warn that full patches won’t be available for a few weeks.

SecurityWeek’s Cyber AI & Automation Summit took place on December 4th, as an online event.

The newly discovered DroidBot Android trojan targets 77 banks, cryptocurrency exchanges, and national organizations.

People on the Move

Shanta Kohli has been named CMO at Sysdig.

Cloud security firm Sysdig has appointed Sergej Epp as CISO.

F5 has appointed John Maddison as Chief Product Marketing and Technology Alliances Officer.

Video platform Vimeo has appointed Ryan Weeks as Chief Information Security Officer.

LPL Financial has welcomed Renana Friedlich as Chief Information Security Officer.

More People On The Move
China Telecom Hack China Telecom Hack

A top White House official said at least eight U.S. telecom firms and dozens of nations have been impacted by a Chinese hacking campaign.

Russian APT zero-day Russian APT zero-day

Russia’s Turla hackers hijacked 33 command servers operated by Pakistani hackers who had themselves breached Afghanistan and Indian targets.

Solana Web3 supply chain attack Solana Web3 supply chain attack

Supply chain attack leads to decentralized application developers downloading backdoored versions of the Solana Web3.js library.

Top Cybersecurity Headlines

McInerney’s path to becoming a hacker is subtly different to many other hackers. He started as a 22-year old psychology graduate rather than a computer-obsessed 9-year old kid.

The ‘Bootkitty’ prototype UEFI bootkit contains an exploit for LogoFAIL and was created in a South Korea university program.

Russian authorities have reportedly arrested Mikhail Matveev, who is wanted by the US for ransomware attacks against critical infrastructure.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Don’t miss this Live Attack Demonstration to learn how hackers operate and gain knowledge to strengthen your defenses against deepfake and BEC fraud.

Register

Learn how to develop a holistic solution that provides you and your team the power to mitigate cyber threats effectively within your OT environment.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 2025, Stay Tuned]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

Huddle with your peers to measure the costs, benefits, and risks of deploying machine learning and predictive AI tools in the enterprise, the threat from adversarial AI and deepfakes, and preparation for the inevitable compliance and regulations. (December 4, 2024)

Learn More

SecurityWeek’s Identity & Zero Trust Strategies Summit is laser focused on helping organizations to level up their Identity and Zero Trust security strategies. (Oct. 9, 2024)

Learn More

Vulnerabilities

Cybercrime

New Community Ranks Hackers, Tracks Hacks and PointsSometimes hacking is about money; other times, it’s about competition, and when that happens, it is also about getting a little credit.

Amazon Web Services today announced “AWS GovCloud”, a new AWS Region designed specifically to help U.S. government agencies and contractors move IT applications and systems into the cloud by addressing specific regulatory and compliance requirements.

Malware Lets Attackers Snoop on Victims’ Calls and Record GPS Location of the DeviceResearchers from Trend Micro have uncovered a new variant of a malicious Google Android app that is making the rounds and disguising itself as a Google+ app.

New Technology Enforces Mobile Security Policy on a "Situationally Aware" Basis AirPatrol Corp. today unveiled ZoneDefense, a monitoring and security technology that lets enterprises detect any mobile device on premise, track its location, check its compliance with company policy and enforce rules based on where the user is located and who is nearby.

A new study by NSS Labs places Internet Explorer 9 (IE9) at the top of the heap when it comes to blocking socially-engineered malware attacks.With its SmartScreen Filter and Application Reputation technologies enabled, IE9 was able to block 99.2 percent of live threats globally during a test conducted between May 27 and June 10. The test stacked IE up against Google Chrome 12, Apple Safari 5, Mozilla Firefox 4 and Opera 11, and included a list of roughly 1,200 malicious...

Following ZeuS, SpyEye Source Code is Leaked to the PublicThe SpyEye malware kit has long been both the bane of unsuspecting victims and a boon for cyber-criminals. Now, according to security firm Damballa, the situation may have taken a turn for the worse.

In my previous column, I outlined how software vendors can best identify if they have a piracy problem. Once software piracy is identified it is important to know the scope of the problem because it will help to determine the best way to deal with it. Once an Independent Software Vendor (ISV) discovers that their software has been pirated, the gut reaction is to put an immediate stop to it. After all, this is their life’s work.

Google today announced that it would acquire Motorola Mobility Holdings, Inc. (NYSE: MMI) for approximately $12.5 billion in cash.Representing a premium of 63% to the closing price of Motorola Mobility shares on Friday, August 12, 2011, Google will pay $40 per share in cash for the company.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Google has announced the open source availability of Vanir, a patch validation tool for Android platform developers.

Cloud Security

Cloud Security

Veeam releases patches for two vulnerabilities in Service Provider Console, including a critical-severity remote code execution bug.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.