Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

More than 1,000 suspects were arrested in raids in at least five provinces between Monday and Wednesday, according to Information Minister Neth Pheaktra and police.

Codenamed Eastwood, the operation targeted the so-called NoName057(16) group, which was identified as being behind a series of DDoS attacks on municipalities and organizations linked to a NATO summit.

Cyberattack disrupted UNFI’s operations in June; company estimates $50–$60 million net income hit but anticipates insurance will cover most losses.

A threat actor that may be financially motivated is targeting SonicWall devices with a backdoor and user-mode rootkit.

Virtual event brings together leading experts, practitioners, and innovators for a full day of insightful discussions and tactical guidance on evolving threats and real-world defense strategies in cloud security.

Compumedics has been targeted by the VanHelsing ransomware group, which stole files from the company’s systems.

iCOUNTER, which helps organizations defend against targeted attacks, has launched under the helm of former Mandiant president and COO John Watters.

Google refused to share any details on how its Big Sleep AI foiled efforts to exploit a SQLite vulnerability in the wild.

Chinese hacking group Salt Typhoon targeted a National Guard unit’s network and tapped into communications with other units.

Cameron John Wagenius pleaded guilty to charges related to hacking into US telecommunications companies.

Italian company Exein has raised €70 million (~$81 million) in a Series C funding round led by Balderton.

People on the Move

Robert Shaker II has joined application security firm ActiveState as Chief Product and Technology Officer.

MorganFranklin Cyber has promoted Nick Stallone and Ferdinand Hamada into newly created roles.

Jessica Newman has joined Sophos as General Manager of Global Cyber Insurance.

Breach and attack simulation solutions provider AttackIQ has appointed Pete Luban as Field Chief Information Security Officer.

Silobreaker announced the appointment of Geoff Brown as its new Chief Executive Officer.

More People On The Move
UNFI Cyberattack UNFI Cyberattack

Cyberattack disrupted UNFI’s operations in June; company estimates $50–$60 million net income hit but anticipates insurance will cover most losses.

US National Guard hacked by China US National Guard hacked by China

Chinese hacking group Salt Typhoon targeted a National Guard unit’s network and tapped into communications with other units.

Belk ransomware attack Belk ransomware attack

DragonForce says it stole more than 150 gigabytes of data from US department store chain Belk in a May cyberattack.

Top Cybersecurity Headlines

A vulnerability affecting systems named End-of-Train and Head-of-Train can be exploited by hackers to cause trains to brake. 

Louis Vuitton customers in the UK, South Korea, Turkey and possibly other countries are being notified of a data breach.

The latest release of the xAI LLM, Grok-4, has already fallen to a sophisticated jailbreak.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

This online session will explore resilience planning in response to geopolitical tensions and help CISOs navigate the current state of federal cybersecurity initiatives.

Register

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

You've heard it a thousand times before: information is power. The more data you have, the more insight and knowledge you possess. But what happens when your data stores grow so large that securing and managing them effectively is no longer in the cards? What happens when every new security control that's put in place to protect data is just another administrative burden—increasing the security event data that must be monitored, logged, shared between security components, analyzed, and reported on.How...

Backdoor Found In ZTE Android SmartphoneZTE, a handset manufacturer in China, has shipped Android smartphones to the U.S. with a fully enabled backdoor. The news of the backdoor came by way of an anonymous post to Pastebin, but was later confirmed by other researchers.[Updated 05/17 to Add ZTE Working On Patch for Backdoor Vulnerability]

Why are people talking about the Cyber Intelligence Sharing and Protection Act (CISPA) as really protecting the United States from cyber threats? The bill claims its goal is to share intelligence on Internet traffic to help “ensure the protection of our national networks against cyber threats.”

Adobe’s Photoshop is a key application within the marketing, advertising, sales, publishing and graphic design markets. Businesses that rely on images to move product use Adobe’s costly flagship product. So when code execution vulnerabilities were discovered in Photoshop 12 (CS5) it’s easy to think that a patch would not only be released, but that it would be free. Those thoughts couldn’t be further from the truth.

Department of Defense Widens of Defense Industrial Base (DIB) Cybersecurity Information Sharing InitiativesThe U.S. Department of Defense, working alongside the U.S. Department of Homeland Security, announced on Friday that they would expand the availability of the cybersecurity information assurance program launched last year.

The Internet Crime Complaint Center (IC3) released its 2011 Internet Crime Report on Thursday, revealing some of the top scams and cybercrime trends for the year.All totaled, the IC3 said it received and processed 314,246 complaints in 2011, averaging out to 26,000 complaints per month. These numbers represent a 3.4 percent increase over the number of complaints received in 2010. The reported dollar loss was $485.3 million.

TrustSphere, a company that provides reputation and messaging intelligence solutions, has released an email security product that leverages a social graph of trusted senders to block spam and reduce the number of messages erroneously sent to junk mail folders, while at the same time helping to defend against targeted attacks.

After suffering a massive amount of embarrassment over the leak of classified and sensitive diplomatic cables to WikiLeaks - allegedly at the hands of an insider - the Army wants to use keylogging software with additional abilities, to prevent another Cablegate scale data breach.Maj. Gen. Steven Smith, chief of the Army Cyber Directorate, told the Army Times, that they would soon be shopping for software that would be pre-programmed to detect abnormal behavior, as well as examine web searches, downloads,...

They call it OpDefiance (or Operation Defiance), and on Wednesday Anonymous pushed forward in their continual acts of defiance by targeting the website of Russia’s on-again-off-again president, Vladimr Putin.

The world of social media, with its wealth of information and volume of potential victims, has remained a popular stomping ground for cyber criminals. While examining the ten most prevalent threat detections for April, GFI Software discovered that Twitter and Facebook were no longer the main sources of material for enterprising scammers.

Apple Auto-Disables Outdated Versions of Flash Player, Pushes Several Security Fixes in Mac OS X 10.7.4 and Safari UpdateFollowing a recent update to its iOS software that addressed several security issues with Apple’s mobile devices, the Cupertino tech titan pushed another significant software update today, this time for its flagship Mac OS X operating system and Safari Web browser.

Dell today announced that it has completed its acquisition of IT security vendor SonicWALL, adding several components to the company’s security software and services portfolio.In a deal that was announced on March 13 of this year, while the terms were not publicly disclosed, Dell reportedly paid $1.2 billion to acquired SonicWALL.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

RevEng.ai has raised $4.15 million in seed funding for an AI platform that automatically detects malicious code and vulnerabilities in software.

Cloud Security

Cloud Security

Virtual event brings together leading experts, practitioners, and innovators for a full day of insightful discussions and tactical guidance on evolving threats and real-world...

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.