Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Bell Ambulance and Alabama Ophthalmology Associates have suffered data breaches affecting over 100,000 people after being targeted in ransomware attacks.

Microsoft security chief Charlie Bell says the SFI’s 28 objectives are “near completion” and that 11 others have made “significant progress.”

North Korean cryptocurrency thieves abusing Zoom Remote collaboration feature to target cryptocurrency traders with malware.

San Francisco startup closes a hefty $75 million Series A funding round led by Khosla Ventures and Mayfield.

Kenzo Security has emerged from stealth mode after 18 months of developing its agentic AI security platform.

With 51% of internet traffic now bot-driven and a growing share of it malicious, organizations must prepare for an era of more evasive, AI-assisted automation.

Countries around the world are preparing for greater digital conflict as increasing global tensions and a looming trade war have raised the stakes.

Lantronix’s XPort device is affected by a critical vulnerability that can be used for takeover and disruption, including in the energy sector.

With unapproved AI tools entrenched in daily workflows, experts say it’s time to shift from monitoring to managing Shadow AI use across the enterprise.

Noteworthy stories that might have slipped under the radar: 4chan hacked, auto-reboot security feature coming to Android, Iranian administrator of Nemesis charged in US.

Data protection firm Cy4Data Labs has raised $10 million in a Series A funding round led by Pelion Venture Partners.

People on the Move

DARPA veteran Dan Kaufman has joined Badge as SVP, AI and Cybersecurity.

Kelly Shortridge has been promoted to VP of Security Products at Fastly.

After the passing of Amit Yoran, Tenable has appointed Steve Vintz and Mark Thurmond as co-CEOs.

Former Wiz executive Trish Cagliostro has joined Orchid Security as Chief Revenue Officer.

Transcend has named former UnitedHealth Group CISO Aimee Cardwell as CISO in Residence.

More People On The Move
Privacy of Social Media and Internet Apps Privacy of Social Media and Internet Apps

With unapproved AI tools entrenched in daily workflows, experts say it’s time to shift from monitoring to managing Shadow AI use across the enterprise.

Windows vulnerability exploited Windows vulnerability exploited

A Windows NTLM vulnerability patched in March has been exploited in attacks targeting government and private institutions.

SonicWall vulnerability exploited SonicWall vulnerability exploited

A SonicWall SMA 100 series vulnerability patched in 2021, which went unnoticed at the time of patching, is being exploited in the wild.

Top Cybersecurity Headlines

The vulnerabilities are described as code execution and mitigation bypass issues that affect Apple’s iOS, iPadOS and macOS platforms.

The US government’s cybersecurity agency CISA has “executed the option period on the contract” to keep the vulnerability catalog operational.

China accuses three alleged U.S. NSA operatives of cyberattacks targeting critical infrastructure and the Asian Games in Harbin.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

This webinar will guide you in aligning your security testing strategy with the right tools, helping you move beyond identifying weaknesses to effectively validating your overall security posture.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

Social media can be a useful tool for businesses, bringing substantial benefits to marketing and communications with customers and employees, when used properly. But as any IT security department knows, social networks such as Facebook, Twitter and LinkedIn pose a significant threat to users across the board as they blindly click links which often lead to spam, clickjacking attacks, or other malicious sites that could result in malware infection.

Considerations That can Help Enterprises Protect Themselves Against MalwareThus far 2011 has had the ignominious distinction of being the year of the breach, and modern malware has been one of the key transformative technologies that have enabled hackers to become far more intelligent and persistent in their attacks.

McAfee today said that it has appointed Jean-Claude Broido as president of McAfee Japan.Broido brings over 30 years of sales and marketing leadership experience in the US, Europe, Asia and Japan, most recently as senior vice president of International Sales at EMC’s Information Intelligence Group. Prior to EMC, Broido was executive vice president and general manager of EMEA for Documentum.

We’re not talking about plain old rules, but rather mandated rules as defined in a federally enacted legislation. As someone with a career in information security, my first answer is “yes, regulation is good for security.” Regulation helps make sure that people and companies are protecting the security of their systems, networks, and information, even minimally. If you are faced with regulatory compliance, you are faced with a legal issue. And, if you are not compliant, you are essentially breaking...

In 2009, Vivek Kundra was named as the country's first CIO and was charged with improving efficiency while also making government data more available to the public. Part of his plan was to transform federal IT management with a cloud-first policy and get away from wasteful spending on IT infrastructure. We’re slowly seeing a shift take place, and today an announcement was made on another set government IT assets moving to the cloud.

TRICARE Breach Potentially Puts 4.9 Million Individuals at RiskA massive data breach that could potentially affect 4.9 million individuals who received services from TRICARE, a provider of health care services to active and retired military personnel, was disclosed this week.

IT security talent is in high demand across government agencies and private companies, with a shortage of resources among the federal agencies that is creating a challenge in managing successful cybersecurity operations. Last year, the U.S. Cyber Command, which was scheduled to be “fully operational” by October 1st, missed its deadline, primarily due to the challenge of finding qualified personnel.

Juniper Networks today announced new enhancements to its Junos Pulse Mobile Security Suite, bringing new mobile device management and security controls, as well as an API to allow service providers and OEMs to integrate with the platform.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Lemonade says the incident is not material and that its operations were not compromised, nor was its customer data targeted.

Cloud Security

Cloud Security

The greatest security policies in the world are useless if enterprises don’t have a reasonable, consistent, and reliable way to implement them.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.