Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

The blame of security incidents may be shared—but the burden of response always falls on the security team. Here’s how to prepare for the inevitable.

Critical vulnerabilities in Cisco Identity Services Engine could lead to elevation of privileges and  system configuration modifications.

Researchers see dozens of fake DeepSeek websites used for credential phishing, cryptocurrency theft, and scams.

7AI has launched an agentic security platform, which uses AI agents to handle repetitive tasks.

San Francisco application security startup raises $100 million in a Series D funding round led by Menlo Ventures. 

DeepSeek has computer code that could send some user login information to China Mobile.

With each passing year, social engineering attacks are becoming bigger and bolder thanks to rapid advancements in artificial intelligence.

David Kennedy is a hacker. There is no doubt about that. He has qualities common among hackers, but also many differences.

Just as OT technology differs from IT technology, the threats, likely adversaries, and potential harm also differ.

A significant number of cybersecurity-related merger and acquisition (M&A) deals announced in January 2025. 

Riot has raised $30 million in Series B funding for a platform that helps employees improve their cybersecurity posture.

People on the Move

Cloud security firm Mitiga has appointed Charlie Thomas as Chief Executive Officer.

Cynet announced the appointment of Jason Magee as Chief Executive Officer.

Ajay Garg has joined Saviynt as Chief Development Officer.

Penetration testing and offensive security firm Cobalt has named Gunter Ollmann as Chief Technology Officer.

Data security company Cyberhaven has named Chris Bates as its Chief Security Officer.

More People On The Move
David Kennedy David Kennedy

David Kennedy is a hacker. There is no doubt about that. He has qualities common among hackers, but also many differences.

Exploited vulnerability Exploited vulnerability

Multiple Zyxel legacy DSL CPE products are affected by exploited zero-day vulnerabilities that will not be patched.

AMD CPU vulnerability AMD CPU vulnerability

AMD has released patches for a microprocessor vulnerability found by Google that could allow an attacker to load malicious microcode.

Top Cybersecurity Headlines

The February 2025 Android patches resolve 46 vulnerabilities, including a Linux kernel bug that has been exploited in the wild.

2025 is an important year – it is probably our last chance to start our migration to post quantum cryptography before we are all undone by cryptographically relevant quantum computers.

“Texas will not allow the Chinese Communist Party to infiltrate our state’s critical infrastructure through data-harvesting AI and social media apps,” Abbott said.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Explore trends and technologies that will shape the future of cybersecurity. Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 2025, Stay Tuned]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.(February 26, 2025)

Learn More

Supply Chain Security Summit
Join us as we explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects. (March 19, 2025)

Learn More

Vulnerabilities

Cybercrime

In response to an article published by NPR surrounding the recent arrest of alleged members of the Anonymous hacking group, Anonymous & Lulz Security, in a joint statement, responded with an open letter to the FBI and “international law authorities,” and specifically responding to statements from FBI director Steve Chabinsky.

NATO Hacked By Anonymous: Claims SQL Injection Attack Yielded 1GB of Restricted Data Highly flying, and highly visible hacktivist group Anonymous, is claiming it has hacked into a NATO system, and is sitting on approximately a gigabyte of NATO restricted data. Interestingly, the group is saying they probably won’t publish the data, as it would be “irresponsible,” as the group described it.

We’re seeing a fast-growing trend in the hacking community that, sadly, many aren’t noticing: search engines can be turned into tools for attackers in numerous ways. What can businesses do to fight back?The Basics: Exploiting Hot Topics

Following yesterday's announcement of record quarterly revenue of $28.57 billion and record quarterly profit of $7.31 billion, Apple today launched Mac OS X Lion, the eighth major release of its operating system.While OS X Lion flaunts more than 250 new features, we thought it would be appropriate to run through them and highlight some of the security and privacy related features that would be of interest to our security-minded audience.

Skydera C3 Developer Edition Enables Cloud Command & Control for Amazon AWS, RackSpace, GoGrid, SliceHost Skydera, a provider of cross-cloud IT automation solutions, today launched Skydera C3 Developer Edition, a solution that brings developers enterprise-grade security to public cloud and hybrid cloud environments, and true developer self-service.

Have you considered how you’ll secure your IPv6 infrastructure? Even if you aren’t implementing an IPv6 network, you still need to be concerned about the transition. Here is how can you be sure your network remains protected as the industry moves towards IPv6.

RedSeal Systems, Inc., a provider of network security optimization solutions that help companies identify holes in their security infrastructure, announced that it has appointed existing board member and security industry expert Parveen Jain as the company's new chief executive officer.

The Pennsylvania Department of Banking today warned the public about an advance fee loan scam being carried out on the Internet under the name Ridley Creek Financing Group.According to the Department of Banking, the company's Web site solicits personal loans and asks for personal financial information, such as Social Security numbers, which could be used to commit identity fraud and drain victim's accounts. The company also asks for funds to be wired to process the loan.

Survey Reveals That IT Security Personnel Are Making Dangerous Security Trade-OffsWith the significant spike in recent data breaches and cyber attacks, organizations around the world are scrambling to implement additional security measures to help develop a strong security posture.

Recovering from a breach can be expensive, just ask Sony or any other company that has fallen victim to a cyber attack recently. Not only are the costs stemming from investigations, breach notifications and fines expensive for organizations, the damage done to a brand and loss of customer confidence can be incredibly costly.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

San Francisco application security startup raises $100 million in a Series D funding round led by Menlo Ventures. 

Cloud Security

Application Security

APIs are easy to develop, simple to implement, and frequently attacked. They are  prime and lucrative targets for cybercriminals. 

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.