Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Noteworthy stories that might have slipped under the radar: Capital One hacker’s sentence reversed, Google patches critical Chrome vulnerability, the story of an Expat flaw. 

The Cloak ransomware group has claimed responsibility for a February cyberattack on Virginia Attorney General’s Office.

Join the virtual event as we explore of the critical nature of software and vendor supply chain security issues.

Cato Networks discovers a new LLM jailbreak technique that relies on creating a fictional world to bypass a model’s security controls.

The FishMonger APT group, a subdivision of Chinese cybersecurity firm I-Soon, compromised seven organizations in a 2022 campaign.

Industry professionals comment on Google acquiring cloud security giant Wiz for $32 billion in cash.

The Hellcat ransomware group claims to have stolen tens of gigabytes of data from Ascom and Jaguar Land Rover.

Former NFL and University of Michigan assistant football coach Matt Weiss hacked into the computer accounts of thousands of college athletes seeking intimate photos and videos.

More details have come to light on the recent supply chain attack targeting GitHub Actions, including its root cause.

Analysis reveals a 140% increase in browser phishing, including a 130% increase in zero-hour phishing attacks.

Real-time event and risk detection firm Dataminr has raised $85 million from NightDragon and HSBC to accelerate AI development.

People on the Move

Life360 has appointed Vari Bindra, former Amazon cybersecurity lead, as Chief Information Security Officer.

Forcepoint has appointed Guy Shamilov as CISO, Bakshi Kohli as CTO and Naveen Palavalli as CPO and CMO.

Paul Calatayud has been named CISO of developer security posture management firm Archipelo.

Cyber readiness and response firm Sygnia has appointed Avi Golan as its new CEO.

Cybersecurity firm Absolute Security announced Harold Rivas as its new CISO.

More People On The Move
GitHub supply chain attack GitHub supply chain attack

More details have come to light on the recent supply chain attack targeting GitHub Actions, including its root cause.

WhatsApp Exploits WhatsApp Exploits

Attacks involving Paragon’s Graphite spyware involved a WhatsApp zero-day that could be exploited without any user interaction.

Google acquires Wiz Google acquires Wiz

News analysis: Google positions itself to compete with Microsoft for enterprise security dollars. How does this deal affect startup ecosystem?

Top Cybersecurity Headlines

A long-running campaign phishing for credentials through scareware recently switched to targeting macOS users.

Google has confirmed reports that it’s buying cloud security giant Wiz and says it’s prepared to pay $32 billion in cash.

A year-old vulnerability in a third-party ChatGPT tool is being exploited against financial entities and US government organizations.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

This webinar will guide you in aligning your security testing strategy with the right tools, helping you move beyond identifying weaknesses to effectively validating your overall security posture.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

This event delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Learn More

Supply Chain Security Summit
Join us as we explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects. (March 19, 2025)

Learn More

Vulnerabilities

Cybercrime

Next year you'll be able to do all your holiday shopping without ever opening a physical wallet—or so Google hopes. The previously announced Google Wallet is comfortably into beta. Google is betting that by 2014 half of all smart phones will ship with compatible NFC chips installed. They hope that Google Wallet will be on most if not all of them.

Cyber-Ark Software, a provider of enterprise security solutions that help companies secure and manage accounts, sessions, critical applications and data, this week announced that it has signed an agreement for a $40 million investment round led by Goldman Sachs and Jerusalem Venture Partners (JVP).

2012 IT Security Predictions: What Will the Threat Landscape Look Like in the New Year?Very soon, 2011 will come to a close. It has been quite a year for hackers and security companies alike.

New Service Matches Data from WHOIS domain registries, IP geo-location to Other Sources to Identify Non-compliant Organizations.Software intelligence solutions provider V.i. Labs has launched a new service that will allow independent software vendors (ISVs) to match license infringement records to named entities, enabling them to deal with the problems associated with the unlicensed use of their software.

Hackers from China have breached computer systems at the U.S. Chamber of Commerce, resulting in access to operational data and information on its 3 million members, according to a report from the Wall Street Journal.

There are some things that the best CIOs and IT managers can’t prevent entirely as they depend on other people. An example of this is the employee who leaves a laptop open in a coffee shop and walks away “just for a few minutes.” There are some things which every CIO has control over, however. When these are overlooked, and a breach occurs, I have to shake my head at how easy it would have been to prevent. Here are...

FishNet Security announced today that it has acquired Logic Trends Inc., a provider of identity and access management solutions.Founded in 2002, Roswell, Georgia-based Logic Trends offers identity and access management solutions including Simplified Sign-On, Strong Authentication, and more, and provides strategic guidance, implementation and support services.

With all the attention on SCADA and Industrial Control Systems cyber security in the year following Stuxnet, ENISA, Europe’s cyber security agency, has issued the results of a study that describes the current situation on Industrial Control Systems (ICS) security and proposes recommendations for improving it.

We have an Entire Commercial Class of Security Professionals, but Few Hackers. Where are our Cyber Warriors? 

Gaining unauthorized Internet access and hiding your tracks have become common skills for a whole generation that feels information and communication should be free, even at work.Cisco recently released its 2011 Connected World Technology Report which surveyed the world’s next generation workforce, and included the views of approximately 3,000 college students and young professionals in response to the following two questions:

A Leaked FBI Warning about Doxing Somewhat Misses the Bigger Picture.An FBI intelligence bulletin released over the weekend by Anonymous, says that law enforcement personnel and other victims are at risk for identity theft due to the nature of doxing, or exposing personal information on a victim to the public.

Iran has captured an RQ-170 drone used by the CIA, and according to unconfirmed reports from the Christian Science Monitor (CSM), the Iranians were able to pull off such a feat by targeting the drone’s GPS systems.The CSM interviewed an Iranian engineer who is said to be working as part of a team assigned to study the remotely piloted aircraft (RPA). He explained that the process of capturing the drone centered on spoofing the communications signal used to manage GPS.

Let’s start with the visual image of one of those mechanical claw arcade machines – the one where you insert a few quarters and grab a toy with a mechanical claw. These can be addictive games for some of us.Let’s take that same visual image. But instead of a claw dropping down onto a pile of beanie babies, let’s visualize a hacker reaching through your login screen and feeling around for your database. Picture the hacker running impenetrable scripts instead...

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Google has integrated OSV-SCALIBR features into OSV-Scanner, its free vulnerability scanner for open source developers.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.