Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Noteworthy stories that might have slipped under the radar: Cloudflare outage not caused by cyberattack, Dutch police identified 126 users of Cracked.io, the Victoria’s Secret cyberattack has cost $10 million. 

Threat actors have abused the TeamFiltration pentesting framework to target over 80,000 Entra ID user accounts.

Industry professionals comment on the Trump administration’s new executive order on cybersecurity. 

CISA warns that vulnerable SimpleHelp RMM instances have been exploited against a utility billing software provider’s customers.

Multiple legitimate, unusual tools were used in a Fog ransomware attack, including one employed by Chinese hacking group APT41.

Mitel has announced patches for a MiCollab path traversal vulnerability that can be exploited remotely without authentication.

Trend Micro patches critical-severity Apex Central and Endpoint Encryption PolicyServer flaws leading to remote code execution.

ZeroRISC has raised $10 million in seed funding for production-grade open source silicon security, built on OpenTitan designs.

Citizen Lab publishes forensic proof that spyware maker Paragon can compromise up-to-date iPhones. Journalists in Europe among victims.

AI-generated voice deepfakes have crossed the uncanny valley, fueling a surge in fraud that outpaces traditional security measures. Detection technology is racing to keep up.

Hirundo tackles AI hallucinations and bias by making trained models “forget” poisoned, malicious, and confidential data.

People on the Move

Cloud security startup Upwind has appointed Rinki Sethi as Chief Security Officer.

SAP security firm SecurityBridge announced the appointment of Roman Schubiger as the company’s new CRO.

Cybersecurity training and simulations provider SimSpace has appointed Peter Lee as Chief Executive Officer.

Orchid Security has appointed a new Chief Product Officer and three advisors.

Kaseya has appointed Rania Succar as Chief Executive Officer.

More People On The Move
Trump Cybersecurity Executive Order Trump Cybersecurity Executive Order

Industry professionals comment on the Trump administration’s new executive order on cybersecurity. 

Mitel MiCollab vulnerabilities Mitel MiCollab vulnerabilities

Mitel has announced patches for a MiCollab path traversal vulnerability that can be exploited remotely without authentication.

Deepfake voice Deepfake voice

AI-generated voice deepfakes have crossed the uncanny valley, fueling a surge in fraud that outpaces traditional security measures. Detection technology is racing to keep up.

Top Cybersecurity Headlines

The new attack technique uses smartwatches to capture ultrasonic covert communication in air-gapped environments and exfiltrate data.

Interpol has announced a crackdown on infostealer malware in Asia as part of an effort called Operation Secure.

Series E funding round brings Cyera’s total funding to over $1.3 billion and values the data security firm at $6 billion.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Register

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

McAfee Finds Nearly One in Every Six PC's Have Zero ProtectionAccording to a global study by McAfee, Intel’s security operation, one-in-six computers globally are running without any sort of cyber threat protection. The study ranks systems that were either running with no anti-virus, or those with anti-virus applications that were disabled.

Wave Systems has signed a 15-year software license and distribution agreement with Samsung, enabling Samsung to bundle Wave’s EMBASSY Security Center (ESC) and TCG Software Stack (TSS) technology with devices that include a Trusted Platform Module (TPM), an industry standard security chip embedded in the motherboard of a computer or other electronic device.

Continuing the series of protests conducted in an effort to support students in Quebec, where Anonymous targeted 13 government and police websites, the associative group has stated that they will wreck the FIA as they turn their sights on Formula 1’s Montreal Grand Prix.

Hacker Faces Charges After Hacking Point-of-Sale Systems at More Than 150 Subway RestaurantsLast year, four Romanian nationals were charged for their role in an alleged scheme to hack point-of-sale (POS) systems and compromise credit and debit card transaction data. On Tuesday, one of the four men was finally extradited to the U.S. so that he could appear before a judge.

Metasploit is a powerful and popular tool for penetration testers and security experts. However, it’s also a goldmine for the darker side of the hacking community. Recently, Rapid 7 published a list of most popular Metasploit modules, offering an interesting look at the vulnerabilities that earned the most attention last month.

Access control vendor Centrify announced the availability today of a new product for to help manage mobile devices.Leveraging the new Centrify Cloud Service, Centrify DirectControl for Mobile is meant to address concerns related to the bring-your-own-device approach. The technology allows organizations to manage smartphones and tablets, including Apple iPads and Google Android devices, using existing Active Directory infrastructure, skill sets and processes.

Security Information and Event Management (SIEM) solutions have been put under the microscope and are often criticized by some in the industry as being outdated and “reactive” security solutions that don’t always help organizations defend against cyber attacks, but rather help respond after a damaging attack. While SIEM solutions may be taking some heat, they still play an important role in an organization’s overall security strategy, and new research from McAfee shows that SIEM is still top of mind for...

Some Say China Falsely Accused Over Backdoor Discovered on FPGA Chip Used by U.S. MilitaryOver the holiday weekend, news that Cambridge University researchers discovered a backdoor on a field-programmable gate array (FPGA) chip used by the U.S military spread like wildfire, but there are some doubts that the story is worth the hype.

On Friday, the University of Nebraska said it was investigating a cyber attack that resulted in a security breach of an information system that houses sensitive data on students and alumni dating back to 1985.The breach hit the Nebraska Student Information System (NeSIS), the electronic database that contains personal records for students, alumni and applicants of the university’s four campuses.

Lawmakers warning anyone who will listen about terrorist-based or state sponsored cyber attacks have gained an unexpected source of confirmation; the terrorists themselves.“This is the clearest evidence we’ve seen that Al Qaeda and other terrorist groups want to attack the cyber systems of our critical infrastructure,” Senator Joe Lieberman said. His remarks were made last week during a session of the Homeland Security and Governmental Affairs Committee.

Researchers at F-Secure have discovered a PDF being circulated online that is using the upcoming Olympic summer games in London as bait. The interesting thing is that the malicious PDF is targeting an exploit that is nearly 2 years old.The PDF itself was discovered when F-Secure lab researchers were data mining their collection network for documents that drop executables. Given that the file was a sample collected as part of their ongoing operations, it could have originated from a malicious website, as...

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Security researchers uncover critical flaws and widespread misconfigurations in Salesforce’s industry-specific CRM solutions.

Cloud Security

Artificial Intelligence

Maze and its investors are betting on finding profits in software that uses AI-powered agents to automate critical parts of the process.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.