Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Apple rolls out iOS and macOS platform updates to fix serious security bugs that could be triggered simply by opening an image or video file.

Andy Frain was targeted by the Black Basta ransomware group in 2024 and the hackers have stolen a wide range of information.

Google has agreed to a $1.375 billion settlement with Texas in lawsuits over location and private browsing tracking, and biometric data collection.

Ascension Health has notified the HHS that more than 437,000 people were affected by a recently disclosed data breach.

Two vulnerabilities in ASUS’s pre-installed software DriverHub can be exploited for remote code execution.

Global Crossing Airlines is investigating a cybersecurity incident after Anonymous hackers targeted its systems.

German authorities seized the servers of crypto-swapping service eXch for laundering approximately $1.9 billion in fraudulent assets.

Anyproxy and 5socks, websites offering proxy services through devices ensnared by a botnet, have been disrupted in a law enforcement operation.

Noteworthy stories that might have slipped under the radar: surge in cyberattacks between India and Pakistan, Radware cloud WAF vulnerabilities, xAI key leak.

Supply chain attack compromises the popular rand-user-agent NPM package to deploy and activate a backdoor.

VMS firm Valsoft Corporation says the personal information of over 160,000 people was compromised in a February 2025 data breach.

People on the Move

Edge Delta has appointed Joan Pepin as its Chief Information Security Officer.

Vats Srivatsan has been appointed interim CEO of WatchGuard after Prakash Panjwani stepped down.

Network security policy management firm FireMon has appointed Alex Bender as Chief Marketing Officer.

Jeffrey Engle has been named CEO of CYBERWELL, the cybersecurity division of WELL Health Technologies.

Cryptographic security solutions provider Garantir has named Trell Rohovit as CEO.

More People On The Move
iOS Update iOS Update

Apple rolls out iOS and macOS platform updates to fix serious security bugs that could be triggered simply by opening an image or video file.

Anyproxy 5socks botnet takedown Anyproxy 5socks botnet takedown

Anyproxy and 5socks, websites offering proxy services through devices ensnared by a botnet, have been disrupted in a law enforcement operation.

LockBit ransomware hacked LockBit ransomware hacked

Private messages, Bitcoin addresses, victim data, and attacker information were leaked after someone hacked a LockBit admin panel.

Top Cybersecurity Headlines

SonicWall patches three SMA 100 vulnerabilities, including a potential zero-day, that could be chained to execute arbitrary code remotely.

Agencies say the attacks leverage basic intrusion techniques, but poor cyber hygiene within critical infrastructure organizations could lead to disruptions and damage.

John Kindervag is best known for developing the Zero Trust Model. He is a hacker, but not within our common definition of a hacker today.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

This webinar will guide you in aligning your security testing strategy with the right tools, helping you move beyond identifying weaknesses to effectively validating your overall security posture.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

The National Cyber Security Alliance (NCSA) and McAfee have produced a report examining the growing false sense of security displayed by mobile users, and how it could impact the nation overall.The research found that 70-percent of smartphone owners say they feel their device is safe from various types of cybercrime. Further, the same percentage said that they have never installed any form of security protection on their mobile device, and that they feel their device is safe from data theft...

Siemens has announced plans to patch a number of critical vulnerabilities in its SCADA software after a researcher accused the company of trying to brush the issue under the rug.In response to claims by security researcher Billy Rios that the company was dismissing reports of vulnerabilities, Siemens issued a statement noting that the company planned to patch a number of issues found by Rios and fellow researcher Terry McCorke next month.

In late November, news surfaced that researchers from Columbia University had discovered vulnerabilities in upgradeable firmware in HP laser printers that could be compromised and modified by an attacker, enabling them to do anything from overheating the printer, to compromising a network, with some saying that the devices could even be set up in flames.

Strategic Forecasting Inc. (Stratfor), a Texas-based intelligence firm that delivers paid briefings on a wide range of topics, suffered a pre-Christmas breach at the hands of those supporting the current incarnation of the AntiSec movement. The fallout has been devastating thus far, but according to comments from those familiar with the breach, this is only the beginning.

Instead of passively waiting for an intruder to trigger a trap you set, consider adding a truly proactive component to your SIEM strategy.Aren't IDS and Log Collectors great? Not so long ago, the problem that most security professionals had was a lack of information. Not any more! Now, many of us have more information than you can throw SQL queries at.

Next year you'll be able to do all your holiday shopping without ever opening a physical wallet—or so Google hopes. The previously announced Google Wallet is comfortably into beta. Google is betting that by 2014 half of all smart phones will ship with compatible NFC chips installed. They hope that Google Wallet will be on most if not all of them.

Cyber-Ark Software, a provider of enterprise security solutions that help companies secure and manage accounts, sessions, critical applications and data, this week announced that it has signed an agreement for a $40 million investment round led by Goldman Sachs and Jerusalem Venture Partners (JVP).

2012 IT Security Predictions: What Will the Threat Landscape Look Like in the New Year?Very soon, 2011 will come to a close. It has been quite a year for hackers and security companies alike.

New Service Matches Data from WHOIS domain registries, IP geo-location to Other Sources to Identify Non-compliant Organizations.Software intelligence solutions provider V.i. Labs has launched a new service that will allow independent software vendors (ISVs) to match license infringement records to named entities, enabling them to deal with the problems associated with the unlicensed use of their software.

Hackers from China have breached computer systems at the U.S. Chamber of Commerce, resulting in access to operational data and information on its 3 million members, according to a report from the Wall Street Journal.

There are some things that the best CIOs and IT managers can’t prevent entirely as they depend on other people. An example of this is the employee who leaves a laptop open in a coffee shop and walks away “just for a few minutes.” There are some things which every CIO has control over, however. When these are overlooked, and a breach occurs, I have to shake my head at how easy it would have been to prevent. Here are...

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Code quality and security firm CodeAnt has secured $2 million in seed funding and it has been valued at $20 million.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.