Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

According to reports, the US Department of Justice will assess whether the deal would harm competition in the cybersecurity market.

The Archetyp Market drug marketplace has been targeted by law enforcement in an operation involving takedowns and arrests. 

Asheville Eye Associates says the personal information of 147,000 individuals was stolen in a November 2024 data breach.

The Indian car sharing marketplace Zoomcar learned that its systems were hacked after a threat actor contacted employees. 

The KillSec ransomware group has stolen hundreds of gigabytes of data from Ireland-based eyecare technology company Ocuco.

The emerging Anubis ransomware becomes a major threat, permanently deleting user files and making recovery impossible.

A strong AI deployment starts with asking the right questions, mapping your risks, and thinking like an adversary — before it’s too late.

Three high-severity Tenable Agent vulnerabilities could allow users to overwrite and delete files, or execute arbitrary code, with System privileges.

A cybersecurity incident at WestJet resulted in users experiencing interruptions when accessing the company’s application and website.

Noteworthy stories that might have slipped under the radar: Cloudflare outage not caused by cyberattack, Dutch police identified 126 users of Cracked.io, the Victoria’s Secret cyberattack has cost $10 million. 

Threat actors have abused the TeamFiltration pentesting framework to target over 80,000 Entra ID user accounts.

People on the Move

Cloud security startup Upwind has appointed Rinki Sethi as Chief Security Officer.

SAP security firm SecurityBridge announced the appointment of Roman Schubiger as the company’s new CRO.

Cybersecurity training and simulations provider SimSpace has appointed Peter Lee as Chief Executive Officer.

Orchid Security has appointed a new Chief Product Officer and three advisors.

Kaseya has appointed Rania Succar as Chief Executive Officer.

More People On The Move
WestJet cyberattack WestJet cyberattack

A cybersecurity incident at WestJet resulted in users experiencing interruptions when accessing the company’s application and website.

Trump Cybersecurity Executive Order Trump Cybersecurity Executive Order

Industry professionals comment on the Trump administration’s new executive order on cybersecurity. 

Mitel MiCollab vulnerabilities Mitel MiCollab vulnerabilities

Mitel has announced patches for a MiCollab path traversal vulnerability that can be exploited remotely without authentication.

Top Cybersecurity Headlines

AI-generated voice deepfakes have crossed the uncanny valley, fueling a surge in fraud that outpaces traditional security measures. Detection technology is racing to keep up.

The new attack technique uses smartwatches to capture ultrasonic covert communication in air-gapped environments and exfiltrate data.

Interpol has announced a crackdown on infostealer malware in Asia as part of an effort called Operation Secure.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Register

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

The University of Hong Kong’s Public Opinion Program offered an unofficial poll for those who could not vote in last week’s elections, but it quickly came under attack the organizers’ said. According to local media, police have arrested two men on charges related to the incident.Ahead of the actual vote on March 25, the University of Hong Kong offered those who were not allowed to vote a chance to express their opinions. The results would not have counted towards any...

Researchers from Kaspersky Lab have found examples of malicious Chrome applications targeting Facebook users in Brazil. The attack use several methods to entice users to install the malware, and despite Google’s best efforts, the criminals behind the attack keep getting new variants into the Chrome Web Store.

In an effort to help users get a better idea of the security status of their MySQL databases, McAfee today released a free open-source audit plug-in that provides detailed database activity audits and helps satisfy audit requirements for the wildly popular open source database platform.McAfee promises that the software-only implementation is easy to deploy and is highly scalable, and ideal for protecting and monitoring MySQL databases in the cloud, with key features including:

Today, Microsoft announced that in collaboration with partners from the financial services industry including FS-ISAC and NACHA, The Electronic Payments Association, and Kyrus Tech, it has successfully taken action against cybercriminal operations that fuel a number of botnets powered by the notorious Zeus family of malware.

Given the necessity of backups, because lets face it - hardware fails, users make mistakes, and hackers have no issue wiping the server after they’re done with it, organizations make it a key part of their business continuity and incident response plans. What about the data stored in that mythical cloud? How is it protected?SecurityWeek recently spoke with a company that wanted to answer that question.

Mandiant this week released the latest version of its Redline tool, a software utility that helps incident responders work faster and more efficiently, promising improved analytics, along with enhancements to audit data collection and configurations in the latest version.

With estimated worldwide cyber crime losses in 2011 over $388 billion, corporations, both large and small, are focusing considerable attention towards the security of their physical infrastructures as well as their outward facing web applications. While most physical infrastructures have been secured, there are still many critical security vulnerabilities in the majority of web applications.

Researchers at ESET have discovered a botnet dubbed "Georbot", a new botnet that targets victims living in the Eurasian state of Georgia. The information stealing Trojan is unusual to a degree, researchers said, given some of its functions and location of its command and control (C&C) server.

In late January 2012 and earlier this month, hundreds and perhaps thousands of WordPress-based domains were compromised in a series of automated attacks. Though there was no official number given, the reason for the compromises has made itself known. They are being used as the final stage in a spam run, likely from the Cutwail botnet, to spread malware.

2011 Cost of Data Breach Study Shows Organizations Employing a CISO With Overall Responsibility for Enterprise Data Protection, Paid Less after a Breach, Saving as much as $80 per compromised Record

eEye Digital Security released a new piece of freeware today for checking system configurations in the name of security.The tool was released on the back of research by eEye about best practices. Among the company’s findings, disabling WebDAV and Microsoft Office document converters prevented 20 percent of Microsoft vulnerabilities in 2011. In addition, eEye also found that users should also limit administrative privileges, use proxy servers, encrypt traffic on VLANs and IPsec and deny access to Windows subsystems.

Attackers are adapting their techniques as software vendors get better at patching vulnerabilities, according to a new report from IBM. In its X-Force 2011 Trend and Risk Report, IBM notes that the amount of vulnerabilities left unpatched in 2011 dropped to 36 percent from 43 percent in 2010. But improvements in securing Web applications may have led attackers to change tactics, sparking an increase in automated password guessing and shell command injection attacks against Web servers, the firm reported.

Hacktivism dominated more than just the headlines in 2011; according to Verizon, it also dominated the world of data breaches.In its 2012 Data Breach Investigations Report, hacktivism was linked to 58 percent of the data that was stolen in 855 incidents last year around the world.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Security researchers uncover critical flaws and widespread misconfigurations in Salesforce’s industry-specific CRM solutions.

Cloud Security

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.