Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

A new attack technique named Policy Puppetry can break the protections of major gen-AI models to produce harmful outputs.

Hundreds of companies are showcasing their products and services at the 2025 edition of the RSA Conference in San Francisco.

Jericho Security has raised $15 million in Series A funding for its AI-powered employee cybersecurity training platform.

The latest Verizon DBIR landed this week with a startling statistic about the security posture of VPNs and network edge devices.

Push Security has raised $30 million in Series B funding to scale its browser-based identity security platform.

AI-powered threat prevention company Augur (rebranded from SecLytics) has raised $7 million in seed funding.

Combined with AI, polymorphic phishing emails have become highly sophisticated, creating more personalized and evasive messages that result in higher attack success rates.

The FBI received roughly 860,000 complaints of malicious activity in 2024, with reported losses exceeding $16.6 billion.

Blue Shield of California says a website misconfiguration exposed the health information of its members to Google.

Cisco is investigating the impact of the Erlang/OTP remote code execution vulnerability CVE-2025-32433 on its products.

Yale New Haven Health System recently discovered that the personal information of millions of patients was stolen from its systems.

People on the Move

David Currie, former CISO of Nubank and Klarna, has been appointed CEO of Vaultree.

Chris Burger has been named Chief Information Security Officer at F5.

Bedrock Security has appointed George Gerchow as Chief Security Officer.

Raffi Joukhadarian has been named Managing Director and Chief Financial Officer at MorganFranklin Cyber.

Data security firm Rubrik has appointed Kavitha Mariappan as its Chief Transformation Officer.

More People On The Move
Healthcare data breach Healthcare data breach

Yale New Haven Health System recently discovered that the personal information of millions of patients was stolen from its systems.

Marks&Spencer cyberattack Marks&Spencer cyberattack

British retailer Marks & Spencer has been experiencing certain service disruptions after falling victim to a cyberattack.

SK Telecom cyberattack SK Telecom cyberattack

SK Telecom, South Korea’s largest telecom company, disclosed a data leak involving a malware infection.

Top Cybersecurity Headlines

Microsoft security chief Charlie Bell says the SFI’s 28 objectives are “near completion” and that 11 others have made “significant progress.”

With unapproved AI tools entrenched in daily workflows, experts say it’s time to shift from monitoring to managing Shadow AI use across the enterprise.

A Windows NTLM vulnerability patched in March has been exploited in attacks targeting government and private institutions.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

This webinar will guide you in aligning your security testing strategy with the right tools, helping you move beyond identifying weaknesses to effectively validating your overall security posture.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

- Getting The Most From Your SIEM Solution -A typical SIEM deployment conversation may look something like this: Vendor: Ms Customer, now that you’ve purchased our shiny new SIEM, complete with new SIEM smell, what use cases would you like to implement?

China telecom giant Huawei has been blocked from participating in a government bid to build a national wireless network for first responders, the reasoning given is national security concerns.According to comments made by the Commerce Department to The Daily Beast, who broke the story, Huawei “will not be taking part in the building of America’s interoperable wireless emergency network for first responders due to U.S. government national-security concerns.”

Database security and risk management vendor, Application Security Inc., has introduced updates to its product line, keeping to the company’s tradition of making database assessment and management an easily navigated and streamlined process.

Study Finds Hacking Discussions on the Rise. What do Hackers Discuss and Exchange in Online Forums?Online forums can be found for just about any topic you can imagine, and it’s no different for those looking to find information and have interactive discussions on the topic of hacking. While many underground forums are hidden and not always easily discoverable and accessible to everyone, many are wide open and easy to find, and welcome newbies looking to dive into the world of...

Following a series of outages last week that affected BlackBerry users around the word over a three day period, RIM has come forward with its plans to “make good” on the incidents that frustrated millions of users who bashed the mobile technology provider, and rightfully so.

Analyzing Outbound and Inbound Traffic, and Network Segmentation Can Help Protect Your Network, Even After It Has Been Compromised.In my previous column I took a long look at modern malware with a focus on how to prevent malware from getting into your network in the first place. In case you missed it, you can read it here.

General Dynamics today announced that its Information Technology unit has been awarded an $86 million contract to provide information assurance and cyber security services to the Defense Intelligence Agency.Under the contract, General Dynamics will provide cyber security services to help ensure the authenticity, integrity and confidentiality of the DIA's information, and protect the agency’s enterprise-level assets, networks, security domains and data resources globally.

SEC Looking to Protect Investors and Boost Breach DisclosureOn Thursday, the U.S. Securities and Exchange Commission’s Corporation Finance division released guidance to publically traded companies on cybersecurity incident disclosure. The goal is to inform investors of risk, and release more information when filing with the SEC.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Endor Labs has raised $93 million in a Series B funding round and announced a major expansion of its AppSec platform.

Cloud Security

Cloud Security

The greatest security policies in the world are useless if enterprises don’t have a reasonable, consistent, and reliable way to implement them.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.