Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Israel-linked Predatory Sparrow hackers torched more than $90 million at Iran’s largest cryptobank as Israel-Iran cyberwar escalates.

Trend Micro and ReversingLabs uncovered over 100 GitHub accounts distributing malware embedded in open source hacking tools.

A ransomware group has claimed the theft of millions of files from procurement service provider Chain IQ and 19 other companies.

After decades of failed attempts to access encrypted communications, governments are shifting from persuasion to coercion—security experts say the risks are too high.

Krispy Kreme is sending notifications to thousands of people impacted by the data breach that came to light at the end of 2024.

In a rapidly changing AI environment, CISOs are worried about investing in the wrong solution or simply not investing because they can’t decide what the best option is.

Cisco has resolved a high-severity vulnerability in Meraki MX and Meraki Z devices. Atlassian pushed patches for multiple third-party dependencies.

A hacker is selling allegedly valuable data stolen from Scania, but the truck maker believes impact is very limited.

Russian hackers posed as US State Department staff and convinced targets to generate and give up Google app-specific passwords.

Misconfigured permissions in Google’s Gerrit code collaboration platform could have led to the compromise of ChromiumOS and other Google projects.

Citrix has released patches for critical- and high-severity vulnerabilities in NetScaler and Secure Access Client and Workspace for Windows.

People on the Move

Checkmarx has appointed Scott Gainey as Chief Marketing Officer.

Jason Hogg has been named Executive Chairman of CYPFER.

HUB Cyber Security has appointed former PayPal and American Express executive Paul Parisi as its Global Chief Revenue Officer.

Cloud security startup Upwind has appointed Rinki Sethi as Chief Security Officer.

SAP security firm SecurityBridge announced the appointment of Roman Schubiger as the company’s new CRO.

More People On The Move
Encryption backdoor debate Encryption backdoor debate

After decades of failed attempts to access encrypted communications, governments are shifting from persuasion to coercion—security experts say the risks are too high.

Scania hack Scania hack

A hacker is selling allegedly valuable data stolen from Scania, but the truck maker believes impact is very limited.

Gmail E2EE encryption Gmail E2EE encryption

Russian hackers posed as US State Department staff and convinced targets to generate and give up Google app-specific passwords.

Top Cybersecurity Headlines

OpenAI has been awarded a $200 million contract for AI capabilities to help the Defense Department address national security challenges.

Hackers have stolen personal and health information belonging to the customers of healthcare organizations served by Episource.

Google is warning insurance companies that Scattered Spider appears to have shifted its focus from the retail sector. 

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Register

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

On Monday, details emerged of what appeared to be an email exchange between a Symantec employee and a hacker using the alias “YamaTough” who claimed he was in possession of Symantec source code back in January, showing that the hacker may have attempted to extort the company, and that Symantec had been negotiating a deal to pay the hacker in exchange for the code not to be released. The exchange, however, was not between Symantec and the hacker, but between...

Visa today announced that U.S. banks have issued an estimated one million Visa-branded, EMV chip-enabled cards as the end of 2011. The milestone shows progress the industry is making toward implementing the more secure card technology, but the U.S. is far behind Europe in terms of adoption.

Hacker Sentenced to 30 Months in Prison for Hacking into Marriott Systems to Extort Employment from the CompanyA hacker who tried to land an IT job at Marriott by hacking into the company’s computer systems and then unwisely extorting the company into hiring him, has been sentenced to 30 months in prison.

Palo Alto Networks Appoints Steffan Tomlinson as Chief Financial Officer Palo Alto Networks, the Santa Clara, California based network security company best known for its Next Generation Firewalls, on Thursday announced that it has appointed Steffan Tomlinson as its new Chief Financial Officer.

Google Highlights Security Processes for Android, Adds New Layer of SecurityOn Thursday, Google outlined a few of their processes for protecting users and securing the Android Market. In addition, they highlighted some interesting facts, which seem to place the rash of mobile risk reports being pushed by security firms into perspective.

With Facebook’s recent IPO filing revealing that it holds over 100 petabytes of photos and videos from its massive global base of 845 million users, it’s no secret that hiding in those millions of profiles are many fake accounts created and operated by cybercriminals.

In November 2011, the FBI and international authorities announced the disruption a massive cybercrime scheme that infected more than four million computers with DNSChanger Malware, malicious software that actively changes an infected system's DNS resolution settings to use rogue servers that can redirect traffic to malicious servers and attempt to steal personal information and generate illegitimate ad revenu

While we must continue to invest in new technologies that provide detection of the latest threats, detection alone isn’t enough.Traditional security solutions are falling short of providing needed protection because they’re typically blind to changing conditions and new attacks. Simply put: you can’t protect what you can’t see.

Netherlands-based AVG Technologies today announced the pricing of its initial public offering of 8.0 million ordinary shares at a priced to at $16.00 per share, an offering that in total will raise approximately $128 million, but net slightly less than $64 million in the company’s pockets after investment banking fees, underwriting discounts and commissions.

Wave Systems, a Massachusetts-based provider of encryption and security solutions, this week launched Wave Encryption Service (WES), a cloud-based encryption solution designed to be easy to deploy, manage and enforce.

More Formidable Security Threats and High-Profile Attacks Drive Enterprise Demand for Security Intelligence Services Research from International Data Corporation (IDC) on the threat intelligence market, a sector made up of advanced security event monitoring and management technologies that incorporate a variety of threat-related information sources to develop predictive security, predicts the market to grow from $198 million in 2009 to $905 million in 2014.

BlackBerry 7 Devices Get FIPS 140-2 Certification for U.S. and Canadian Governments BlackBerry maker Research In Motion (RIM) today announced that BlackBerry mobile devices running its new BlackBerry 7 and BlackBerry 7.1 Operating Systems  have been awarded FIPS (Federal Information Processing Standard) 140-2 certification by the National Institute of Standards and Technology (NIST) and the Communications Security Establishment Canada (CSEC).

Chainmail is Composed of Several Layers, as Should Your Security Strategy.Everyone has heard of the “layered” security approach, yet very few security professionals seem to fully appreciate what is actually meant by it, nor do they know how to go about designing such a strategy. The conventional view is similar to an ice cream sandwich-- each layer piled on top of the other, providing a thick pillow of protection that a would-be information assassin has to fully penetrate in order...

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Security researchers uncover critical flaws and widespread misconfigurations in Salesforce’s industry-specific CRM solutions.

Cloud Security

Cloud Security

Cloud security startup Circumvent has raised $6 million to develop a network of agents for autonomous prioritization and remediation.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.