Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Hundreds of companies are showcasing their products and services at the 2025 edition of the RSA Conference in San Francisco.

Jericho Security has raised $15 million in Series A funding for its AI-powered employee cybersecurity training platform.

The latest Verizon DBIR landed this week with a startling statistic about the security posture of VPNs and network edge devices.

Push Security has raised $30 million in Series B funding to scale its browser-based identity security platform.

AI-powered threat prevention company Augur (rebranded from SecLytics) has raised $7 million in seed funding.

Combined with AI, polymorphic phishing emails have become highly sophisticated, creating more personalized and evasive messages that result in higher attack success rates.

The FBI received roughly 860,000 complaints of malicious activity in 2024, with reported losses exceeding $16.6 billion.

Blue Shield of California says a website misconfiguration exposed the health information of its members to Google.

Cisco is investigating the impact of the Erlang/OTP remote code execution vulnerability CVE-2025-32433 on its products.

Yale New Haven Health System recently discovered that the personal information of millions of patients was stolen from its systems.

Identity protection startup AuthMind has announced raising $19.3 million in a seed funding round led by Cheyenne Ventures.

People on the Move

Raffi Joukhadarian has been named Managing Director and Chief Financial Officer at MorganFranklin Cyber.

Data security firm Rubrik has appointed Kavitha Mariappan as its Chief Transformation Officer.

DARPA veteran Dan Kaufman has joined Badge as SVP, AI and Cybersecurity.

Kelly Shortridge has been promoted to VP of Security Products at Fastly.

After the passing of Amit Yoran, Tenable has appointed Steve Vintz and Mark Thurmond as co-CEOs.

More People On The Move
Healthcare data breach Healthcare data breach

Yale New Haven Health System recently discovered that the personal information of millions of patients was stolen from its systems.

Marks&Spencer cyberattack Marks&Spencer cyberattack

British retailer Marks & Spencer has been experiencing certain service disruptions after falling victim to a cyberattack.

SK Telecom cyberattack SK Telecom cyberattack

SK Telecom, South Korea’s largest telecom company, disclosed a data leak involving a malware infection.

Top Cybersecurity Headlines

Microsoft security chief Charlie Bell says the SFI’s 28 objectives are “near completion” and that 11 others have made “significant progress.”

With unapproved AI tools entrenched in daily workflows, experts say it’s time to shift from monitoring to managing Shadow AI use across the enterprise.

A Windows NTLM vulnerability patched in March has been exploited in attacks targeting government and private institutions.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

This webinar will guide you in aligning your security testing strategy with the right tools, helping you move beyond identifying weaknesses to effectively validating your overall security posture.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

In an effort to help users get a better idea of the security status of their MySQL databases, McAfee today released a free open-source audit plug-in that provides detailed database activity audits and helps satisfy audit requirements for the wildly popular open source database platform.McAfee promises that the software-only implementation is easy to deploy and is highly scalable, and ideal for protecting and monitoring MySQL databases in the cloud, with key features including:

Today, Microsoft announced that in collaboration with partners from the financial services industry including FS-ISAC and NACHA, The Electronic Payments Association, and Kyrus Tech, it has successfully taken action against cybercriminal operations that fuel a number of botnets powered by the notorious Zeus family of malware.

Given the necessity of backups, because lets face it - hardware fails, users make mistakes, and hackers have no issue wiping the server after they’re done with it, organizations make it a key part of their business continuity and incident response plans. What about the data stored in that mythical cloud? How is it protected?SecurityWeek recently spoke with a company that wanted to answer that question.

Mandiant this week released the latest version of its Redline tool, a software utility that helps incident responders work faster and more efficiently, promising improved analytics, along with enhancements to audit data collection and configurations in the latest version.

With estimated worldwide cyber crime losses in 2011 over $388 billion, corporations, both large and small, are focusing considerable attention towards the security of their physical infrastructures as well as their outward facing web applications. While most physical infrastructures have been secured, there are still many critical security vulnerabilities in the majority of web applications.

Researchers at ESET have discovered a botnet dubbed "Georbot", a new botnet that targets victims living in the Eurasian state of Georgia. The information stealing Trojan is unusual to a degree, researchers said, given some of its functions and location of its command and control (C&C) server.

In late January 2012 and earlier this month, hundreds and perhaps thousands of WordPress-based domains were compromised in a series of automated attacks. Though there was no official number given, the reason for the compromises has made itself known. They are being used as the final stage in a spam run, likely from the Cutwail botnet, to spread malware.

2011 Cost of Data Breach Study Shows Organizations Employing a CISO With Overall Responsibility for Enterprise Data Protection, Paid Less after a Breach, Saving as much as $80 per compromised Record

eEye Digital Security released a new piece of freeware today for checking system configurations in the name of security.The tool was released on the back of research by eEye about best practices. Among the company’s findings, disabling WebDAV and Microsoft Office document converters prevented 20 percent of Microsoft vulnerabilities in 2011. In addition, eEye also found that users should also limit administrative privileges, use proxy servers, encrypt traffic on VLANs and IPsec and deny access to Windows subsystems.

Attackers are adapting their techniques as software vendors get better at patching vulnerabilities, according to a new report from IBM. In its X-Force 2011 Trend and Risk Report, IBM notes that the amount of vulnerabilities left unpatched in 2011 dropped to 36 percent from 43 percent in 2010. But improvements in securing Web applications may have led attackers to change tactics, sparking an increase in automated password guessing and shell command injection attacks against Web servers, the firm reported.

Hacktivism dominated more than just the headlines in 2011; according to Verizon, it also dominated the world of data breaches.In its 2012 Data Breach Investigations Report, hacktivism was linked to 58 percent of the data that was stolen in 855 incidents last year around the world.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Endor Labs has raised $93 million in a Series B funding round and announced a major expansion of its AppSec platform.

Cloud Security

Cloud Security

The greatest security policies in the world are useless if enterprises don’t have a reasonable, consistent, and reliable way to implement them.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.