Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Israel-linked Predatory Sparrow hackers torched more than $90 million at Iran’s largest cryptobank as Israel-Iran cyberwar escalates.

Trend Micro and ReversingLabs uncovered over 100 GitHub accounts distributing malware embedded in open source hacking tools.

A ransomware group has claimed the theft of millions of files from procurement service provider Chain IQ and 19 other companies.

After decades of failed attempts to access encrypted communications, governments are shifting from persuasion to coercion—security experts say the risks are too high.

Krispy Kreme is sending notifications to thousands of people impacted by the data breach that came to light at the end of 2024.

In a rapidly changing AI environment, CISOs are worried about investing in the wrong solution or simply not investing because they can’t decide what the best option is.

Cisco has resolved a high-severity vulnerability in Meraki MX and Meraki Z devices. Atlassian pushed patches for multiple third-party dependencies.

A hacker is selling allegedly valuable data stolen from Scania, but the truck maker believes impact is very limited.

Russian hackers posed as US State Department staff and convinced targets to generate and give up Google app-specific passwords.

Misconfigured permissions in Google’s Gerrit code collaboration platform could have led to the compromise of ChromiumOS and other Google projects.

Citrix has released patches for critical- and high-severity vulnerabilities in NetScaler and Secure Access Client and Workspace for Windows.

People on the Move

Checkmarx has appointed Scott Gainey as Chief Marketing Officer.

Jason Hogg has been named Executive Chairman of CYPFER.

HUB Cyber Security has appointed former PayPal and American Express executive Paul Parisi as its Global Chief Revenue Officer.

Cloud security startup Upwind has appointed Rinki Sethi as Chief Security Officer.

SAP security firm SecurityBridge announced the appointment of Roman Schubiger as the company’s new CRO.

More People On The Move
Encryption backdoor debate Encryption backdoor debate

After decades of failed attempts to access encrypted communications, governments are shifting from persuasion to coercion—security experts say the risks are too high.

Scania hack Scania hack

A hacker is selling allegedly valuable data stolen from Scania, but the truck maker believes impact is very limited.

Gmail E2EE encryption Gmail E2EE encryption

Russian hackers posed as US State Department staff and convinced targets to generate and give up Google app-specific passwords.

Top Cybersecurity Headlines

OpenAI has been awarded a $200 million contract for AI capabilities to help the Defense Department address national security challenges.

Hackers have stolen personal and health information belonging to the customers of healthcare organizations served by Episource.

Google is warning insurance companies that Scattered Spider appears to have shifted its focus from the retail sector. 

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Register

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

LogLogic, a provider of SIEM and log management solutions, today released the findings of a study conducted in conjunction with research firm Echelon One on the topics of cloud and “Big Data”. Key in their discoveries is that many seasoned IT professionals have many misconceptions about big data and what it actually is.

Rapid7 released version 4.2 of the Metasploit Framework today, which includes tools needed to assess risk on networks that are deploying or have already deployed IPv6. In addition, the new version offers an additional 54 exploits, 66 auxiliary modules, 43 post-exploitation modules, and 18 payloads.

Juniper Networks today announced that it has acquired Mykonos Software, a security startup that provides technology that uses deception to detect and confuse attackers. Things move fast in the security world, as the company just announced a $4 million round of funding in late January led by Tom Golisano, founder of payroll processing giant Paychex, and former owner of the Buffalo Sabres.

Apple has included a new – and admittedly interesting – security function in the upcoming version of Mac OS Mountain Lion (OS X 10.8). Called Gatekeeper, the function will restrict the installation of downloaded applications based on their source. Think of it as a step-up on Microsoft’s Authenticode. Yet, is it more control for the user, or more control over the user? Also, will it really prevent malicious applications from being installed?

Google has had a rough week so far, and it’s only Wednesday. The problems started last Friday, when the Wall Street Journal reported on the findings of Stanford researcher Jonathan Mayer, who discovered the search giant was circumventing Apple’s privacy settings in Safari. Days later, Microsoft accused Google of cheating protections on its own browser, but is Redmond crying wolf?

Total Malware Samples Surpassed 75 Million in 2011. Malicious Sites Nearly Double, while Mobile Malware Continues to Grow.McAfee today released its Threat Report for the Fourth Quarter of 2011 which indicated that while malware continues to be created at a wild pace, overall growth of PC-based malware actually declined during the quarter.McAfee also said that it has reached a new milestone in terms of total malware captured to-date which has now surpassed 75 million samples.

Securing Critical Infrastructure: Utilities Must Assess The Risks of Their Business Operations and Harden all Devices Attached to the NetworkSixty or seventy years ago when utility infrastructures were first built, they were not interconnected or accessed by third parties. The systems were so isolated, no one outside the organization—including potential attackers—knew what vulnerabilities existed.

In my previous column I touched on the point of implementing Web Application Firewalls (WAFs) as part of a measure to prevent clickjacking. I thought I would expand on the benefits of WAFs, and why they can make all the difference between a safe organization and one that’s been compromised. Many IT managers and CIOs still grapple with WAFs because they are expensive and a bear to maintain.

A threat to target the Internet’s root Domain Name System (DNS) servers and knock the Internet offline may be more difficult than the hackers think. Hackers reputedly associated with Anonymous made the threat to launch what they dubbed “Operation Global Blackout” March 31 in response to actions by Wall Street, the Stop Online Piracy Act (SOPA) and “irresponsible leaders and the beloved bankers who are starving the world for their own selfish needs.”

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Security researchers uncover critical flaws and widespread misconfigurations in Salesforce’s industry-specific CRM solutions.

Cloud Security

Cloud Security

Cloud security startup Circumvent has raised $6 million to develop a network of agents for autonomous prioritization and remediation.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.