Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Noteworthy stories that might have slipped under the radar: Switzerland requires disclosure of critical infrastructure attacks, ESP32 chips don’t contain a backdoor, MassJacker cryptojacking malware.

The ClickFix technique has been employed by cybercrime and APT groups for information stealer and other malware deployment.

Russian-Israeli LockBit ransomware developer Rostislav Panev has been extradited from Israel to the United States.

Measure the different level of risk inherent to all gen-AI foundational models and use that to fine-tune the operation of in-house AI deployments.

Your guide on how to get through the conference with your sanity, energy, and key performance indicators (KPIs) intact.

Two Microsoft researchers have devised a new jailbreak method that bypasses the safety mechanisms of most AI systems.

The newly discovered SuperBlack ransomware has been exploiting two vulnerabilities in Fortinet firewalls.

A recently disclosed Edimax zero-day vulnerability has been exploited in the wild by Mirai botnets for nearly a year.

Meta’s Facebook security team warns of live exploitation of a zero-day vulnerability in the open-source FreeType library. 

Cisco has released patches for 10 vulnerabilities in IOS XR, including five denial-of-service (DoS) bugs.

Threat actors are likely targeting Grafana path traversal bugs for reconnaissance in a SSRF exploitation campaign targeting popular platforms.

People on the Move

Cybersecurity firm Absolute Security announced Harold Rivas as its new CISO.

Simon Forster has been named the new General Manager of DNS security firm Quad9.

Cybersecurity training company Immersive has named Mark Schmitz as its new CEO.

ICS/OT security firm Claroty has appointed Amir Preminger as Chief Technology Officer.

Sasha Pailet Koff has been named Managing Director of the Cyber Readiness Institute.

More People On The Move
Ransomware Ransomware

The newly discovered SuperBlack ransomware has been exploiting two vulnerabilities in Fortinet firewalls.

Medusa ransomware Medusa ransomware

CISA, FBI, and MS-ISAC warn of Medusa ransomware attacks targeting critical infrastructure organizations.

China Volt Typhoon electric grid China Volt Typhoon electric grid

Dragos case study reveals that Volt Typhoon hacked the US electric grid and stole information on OT systems.

Top Cybersecurity Headlines

Microsoft on Tuesday patched a zero-day vulnerability in the Windows Win32 kernel that has been exploited since March 2023.

Redmond ships major security updates with warnings that a half-dozen Windows vulnerabilities have already been exploited in the wild.

Several healthcare organizations in different US states have disclosed data breaches affecting 100,000-200,000 individuals. 

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this in-depth briefing on how to protect executives and the enterprises they lead from the growing convergence of digital, narrative, and physical attacks.

Register

This webinar will guide you in aligning your security testing strategy with the right tools, helping you move beyond identifying weaknesses to effectively validating your overall security posture.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 2025, Stay Tuned]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.(February 26, 2025)

Learn More

Supply Chain Security Summit
Join us as we explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects. (March 19, 2025)

Learn More

Vulnerabilities

Cybercrime

WatchGuard Technologies today announced that it has added SCADA Signatures to its next-generation firewalls and UTMs with Application Control. The SCADA (supervisory control and data acquisition) signatures enable WatchGuard XTM and legacy e-Series security appliances to provide threat protection for industrial control systems that monitor and control industrial, infrastructure or facility-based networks.

NeXpose 2011 Summer Release Brings Increased Deployment Flexibility, Enhanced Integration, Scalability and Improved Administrative CapabilitiesRapid7, a Boston-based provider of vulnerability management and penetration testing solutions, today launched NeXpose® 2011 Summer Release, the latest update of the company’s vulnerability management solution, adding support for private cloud deployments based on its multi-tenant architecture, along with other enhancements.

Operators Sold Networking Gear Supported by Counterfeit Cisco Labels, Boxes, Manuals and Serial Numbers Obtained from Cisco Support SiteAfter selling $1 million worth of counterfeit Cisco equipment through a business operated with a co-defendant, Christopher Myers, 42, of Leawood, Kansas, has been sentenced to 33 months in federal prison.

New Solution Delivers All-Inclusive Software Providing 'Secure Everywhere Access' to Help Meet Regulatory and Compliance Requirements Network security vendor Fortinet, today launched FortiClient, an endpoint software agent that brings secure remote access connectivity to remote devices.

McAfee Appoints Michael DeCesare and Todd Gebhart as Co-Presidents McAfee today said President David DeWalt has announced his resignation, and said it would create an office of the president, to be headed by Michael DeCesare and Todd Gebhart who will serve as co-presidents. DeWalt, who served as President for more than four years, will continue as a non-employee member of the McAfee Board of Directors.

UpdatedAccording to Anonymous, in what the hacker group is calling, “Military Meltdown Monday,” they have acquired and released to the public, a list of approximately 90,000 military emails and Base64 password hashes, after hacking into systems from Booz Allen Hamilton, the large government contractor that works closely with many defense, intelligence, and civil sectors on cyber security. (Anonymous originally stated the passwords were MD5, non-salted hashes)

Just like any business, cybercriminals need to be ready to respond to incidents and events that can be beneficial to their businesses. For cybercriminals utilizing malware as a tool of choice for their dark-sided business, ongoing delivery and spreading of their malicious software is critical to a successful and profitable operation. Malware Delivery Networks are a key component of cybercriminal success, and key component in the the malware supply chain.

It’s always the insider. Well, maybe not always, but it sometimes seems that’s what we are hearing. I was reading articles on some recent cases and any of them seem to have a common theme: “XXX Case Exposes Insider Risks” and “Employee Error Leads to XXX Hack” are just a couple recent headlines. The press also published info about a recent breach which was caused when an employee clicked on an attachment that they pulled from the junk email folder.

The Washington Post has notified users of its job board that a recent a cyber attack has resulted in a data breach that compromised up to 1.27 million job seeker accounts.The Washington Post said that the attack occurred in two brief episodes, once on June 27 and once on June 28, resulting in the attacker(s) getting hold of roughly 1.27 million user IDs and e-mail addresses. Passwords or other personal information were not compromised, the publisher said.

It’s July. An odd time to be talking about Super Bowl security, right? Actually, it’s never too early to focus on information security and risk management, and Super Bowl security is certainly no exception. Super Bowl officials take two full years to plan and implement their strategy. IT security pros everywhere would be well advised to learn from them and take action long before crunch time.

Sophos has completed its acquisition of network security vendor Astaro, a deal that will enable Sophos to deliver endpoint protection combined with Unified Threat Management solutions.The acquisition, which was announced on May 6, 2011, will enable Sophos to:

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

The financing was provided by S Capital and investor Mike Moritz, S32, Glilot Capital Partners, and several angel investors.

Cloud Security

Artificial Intelligence

Google Cloud’s AI Protection helps discover AI inventory, secure AI assets, and manage threats with detect, investigate, and respond capabilities.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.