Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Before engaging in a full-scope exercise, it’s important to assess whether your program, people and processes are truly ready. 

Athena marks a major leap in SOC automation, enabling real-time detection, triage, and remediation with minimal human oversight.

As Xi Jinping advances his vision for China’s dominance by 2049, cybersecurity experts warn that connected technologies—like EV batteries—may quietly serve as tools of influence, espionage, and disruption.

Cybersecurity awareness training platform Pistachio has raised $7 million in a Series A funding round led by Walter Ventures.

Browser security firm LayerX has raised $11 million in a Series A funding round extension led by Jump Capital.

More than 30 companies announced a total of $1.7 billion in funding in weeks leading up to the industry’s largest gathering.

The number of exploited zero-days seen by Google in 2024 dropped to 75, from 98 observed in the previous year.

Hundreds of companies are showcasing their products and services this week at the 2025 edition of the RSA Conference in San Francisco.

More than 400 SAP NetWeaver servers are impacted by CVE-2025-31324, an exploited remote code execution vulnerability.

CISA urges immediate patching for recently disclosed Broadcom, Commvault, and Qualitia vulnerabilities exploited in the wild.

IBM will invest more than $30 billion in research and development to advance and continue its American manufacturing of mainframe and quantum computers.

People on the Move

Tenable has appointed Eric Doerr as its Chief Product Officer.

Michael Adams has joined Docusign as the new Group Vice President and CISO.

Security awareness training firm KnowBe4 has named Bryan Palma as president and CEO effective May 5.

Threat intelligence firm Team Cymru has appointed Joe Sander as its Chief Executive Officer.

Madhu Gottumukkala has been named Deputy Director of the cybersecurity agency CISA.

More People On The Move
Xi’s Silent Weapon: The EV Batteries That Could Shut Down America Xi’s Silent Weapon: The EV Batteries That Could Shut Down America

As Xi Jinping advances his vision for China’s dominance by 2049, cybersecurity experts warn that connected technologies—like EV batteries—may quietly serve as tools of influence, espionage, and disruption.

RSA Conference 2025 RSA Conference 2025

Hundreds of companies are showcasing their products and services this week at the 2025 edition of the RSA Conference in San Francisco.

RSA Conference 2025 RSA Conference 2025

This tension between hard-edged risk realism and breathless AI evangelism sets an unmistakable tone for a bellwether conference where 40,000-plus gather to do business. 

Top Cybersecurity Headlines

A zero-day vulnerability in SAP NetWeaver potentially affects more than 10,000 internet-facing applications.

Yale New Haven Health System recently discovered that the personal information of millions of patients was stolen from its systems.

British retailer Marks & Spencer has been experiencing certain service disruptions after falling victim to a cyberattack.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

This webinar will guide you in aligning your security testing strategy with the right tools, helping you move beyond identifying weaknesses to effectively validating your overall security posture.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

Controversial Domain Registrar Tightens Policy After Reports of Rogue Online Pharmacy LinksRegistrar Internet.bs has changed its domain name registration policy in light of reports criticizing its links to as many as one-third of the rogue pharmacies on the Internet.

On Friday, Palo Alto Networks, the network security firm that has made its mark developing next generation firewalls, filed an S-1 registration statement with the Securities and Exchange Commission for a widely-anticipated initial public offering.

Researchers at NQ Mobile, working alongside researchers at North Carolina State University, have discovered new Android malware that is controlled via SMS that can do a number of things on the compromised device including recording calls and surrounding noise.

Supports of Anonymous targeted the U.K. on Saturday, hitting the websites of the Home Office and the Ministry of Justice. While the attack only lasted a short time, Anonymous has said to expect more of the same as they push forward. Currently, the next target is said to be the GCHQ on April 14.

Network attacks and breaches have dominated the technical and mainstream news for the past 18 months, as attacks have grown both in volume and significance. Hacktivists used data breaches to embarrass their enemies, nation-states used intrusions to steal secrets and even directly attack infrastructure, and organized crime used breaches for good old-fashioned theft.

GreenSQL, a company that SecurityWeek first met earlier this year during the RSA Conference, recently released the results of a poll that included more than 6,000 customers, IT administrators, DBAs, InfoSec practitioners, and consultants. The results, when focused on information security and database security, show that the majority fear SQL Injection vulnerabilities.

What to Do When Your Website Has Been HackedWhile the following is by no means exhaustive, here are a few suggestions to begin with if your web site has been hacked.

John Kiriakou, a former CIA officer from 1999 to 2004, was indicted on Thursday for allegedly disclosing classified information to journalists. The restricted disclosure included the name of a covert officer and information related to the role a CIA employee played in classified operations.His indictment comes following an investigation that was triggered by what the Department of Justice is calling a “classified defense filing” back in January 2009.

Security firm Sophos with dual headquarters in Boston, Massachusetts and Oxford, UK, made a decision to disable its partner portal following a breach that was discovered earlier this week. According to a notice on the portal itself, Sophos doesn’t know if any sensitive data was accessed including passwords and email addresses. Until the investigation in to the breach is concluded, the portal will remain offline.

Containing the Global Cybercrime Threat is The Focus of The CeCOS VI Summit Taking Place in Prague, Czech Republic Later This MonthLater this month, global leaders from various industries, government, law enforcement, communications sectors, and research centers will gather in in Prague, Czech Republic for the Counter eCrime Operations Summit (CeCOS VI).

In Australia, the local police will be informing businesses and residents that their wireless signal is unprotected and therefore open for criminal activity.According to the Sydney Morning Herald, police in Queensland will be the first to provide the new service. It is hoped that securing wireless in the area will help cut down on the number of cases of fraud, however, this is still just an informational campaign with no fines for non-compliance.

Dell SecureWorks recently published a report on the Waledac / Kelihos botnet and its role in a recent takedown operation. Unfortunately, while the initial efforts were successful, the controllers of the botnet have moved on and resumed operations.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Software and AI supply chain transparency firm Manifest has raised $15 million in a Series A funding round led by Ensemble VC.

Cloud Security

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.