Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Microsoft security chief Charlie Bell says the SFI’s 28 objectives are “near completion” and that 11 others have made “significant progress.”

North Korean cryptocurrency thieves abusing Zoom Remote collaboration feature to target cryptocurrency traders with malware.

San Francisco startup closes a hefty $75 million Series A funding round led by Khosla Ventures and Mayfield.

Kenzo Security has emerged from stealth mode after 18 months of developing its agentic AI security platform.

With 51% of internet traffic now bot-driven and a growing share of it malicious, organizations must prepare for an era of more evasive, AI-assisted automation.

Countries around the world are preparing for greater digital conflict as increasing global tensions and a looming trade war have raised the stakes.

Lantronix’s XPort device is affected by a critical vulnerability that can be used for takeover and disruption, including in the energy sector.

With unapproved AI tools entrenched in daily workflows, experts say it’s time to shift from monitoring to managing Shadow AI use across the enterprise.

Noteworthy stories that might have slipped under the radar: 4chan hacked, auto-reboot security feature coming to Android, Iranian administrator of Nemesis charged in US.

Data protection firm Cy4Data Labs has raised $10 million in a Series A funding round led by Pelion Venture Partners.

Legends International says the personal information of employees and customers was compromised as a result of a cyberattack.

People on the Move

DARPA veteran Dan Kaufman has joined Badge as SVP, AI and Cybersecurity.

Kelly Shortridge has been promoted to VP of Security Products at Fastly.

After the passing of Amit Yoran, Tenable has appointed Steve Vintz and Mark Thurmond as co-CEOs.

Former Wiz executive Trish Cagliostro has joined Orchid Security as Chief Revenue Officer.

Transcend has named former UnitedHealth Group CISO Aimee Cardwell as CISO in Residence.

More People On The Move
Privacy of Social Media and Internet Apps Privacy of Social Media and Internet Apps

With unapproved AI tools entrenched in daily workflows, experts say it’s time to shift from monitoring to managing Shadow AI use across the enterprise.

Windows vulnerability exploited Windows vulnerability exploited

A Windows NTLM vulnerability patched in March has been exploited in attacks targeting government and private institutions.

SonicWall vulnerability exploited SonicWall vulnerability exploited

A SonicWall SMA 100 series vulnerability patched in 2021, which went unnoticed at the time of patching, is being exploited in the wild.

Top Cybersecurity Headlines

The vulnerabilities are described as code execution and mitigation bypass issues that affect Apple’s iOS, iPadOS and macOS platforms.

The US government’s cybersecurity agency CISA has “executed the option period on the contract” to keep the vulnerability catalog operational.

China accuses three alleged U.S. NSA operatives of cyberattacks targeting critical infrastructure and the Asian Games in Harbin.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

This webinar will guide you in aligning your security testing strategy with the right tools, helping you move beyond identifying weaknesses to effectively validating your overall security posture.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

Internet security company Kaspersky Lab today announced Kaspersky ONE, a "Universal Security" solution that helps users protect a wide selection of platforms and devices with a single license.With the offering, customers can protect multiple devices, including desktops, laptops, smartphones, and Android-based tablets.

Early this month, Juniper Networks conducted an informal survey on the show floor of VMworld 2011. The survey, which garnered responses from some 60 attendees of the Vegas-hosted event, found that more than 77% of respondents ranked security as a top concern for virtualizing workloads. However, the economic benefits of virtualizing are extremely compelling.

IronKey, a company that originally made its mark offering USB-based hardware solutions ranging from flash drives with encrypted storage, to a virtual desktop solution for carrying a secure computer operating system in your pocket, today said it will be selling off that part of its business.This is a strategic move for Sunnyvale, California based IronKey that has decided to focus its efforts on cloud-based solutions to secure access to Internet services.

Following the recent cyber attack that resulted in an intrusion into DigiNotar’s Certificate Authority (CA) infrastructure and the fraudulent issuance of SSL certificates for hundreds of domains, including Google.com, CIA.Gov and many others, DigiNotar officially will be closing its doors for good.

Bit9, a provider of application whitelisting security solutions, announced on Monday that Richard Clarke, former Cybersecurity Czar for President George W. Bush, has joined the company’s Board of Directors.A recognized expert on cyber war and counter-terrorism, Clarke will provide strategic advice and insight to Bit9 and its board.

Security experts urge organizations to test IPv6 compatibility across security products and gateways as networks undergo upgradesIf your IT department hasn’t thought about an IPv6 strategy yet, you're behind the curve. While IPv6 was designed mainly to address the exhaustion of IPv4 addresses, it’s creating several challenges for IT departments in terms of ensuring the end-to-end stability and performance of enterprise IP networks and the Internet as a whole.

Managing ever-growing volumes of data and being prepared for eDiscovery requests challenges many organizations. Email is no longer the primary source of records companies must produce when it comes to eDiscovery requests—at least according to a recent Symantec-sponsored survey of legal and IT personnel at 2,000 enterprises worldwide.

In a rare move, Oracle broke its normal procedures and issued an emergency patch due to concerns about the impact of a successful attack.The fix addresses a denial-of-service vulnerability in Oracle’s Apache Web server software. According to Oracle, the issue affects multiple versions of Oracle Fusion Middleware 11g Release 1, Oracle Application Server 10g Release 3 and Oracle Application Server 10g Release 2.

Since the discovery of Stuxnet in 2010, there has been a bit of a bull’s eye on the software used to run industrial control systems. Just recently, Italian security researcher Luigi Auriemma poked a new set of holes in Supervisory Control and Data Acquisition (SCADA) products from a number of vendors, including Progea, Rockwell Automation, Cogent and Measuresoft.

Mitsubishi Heavy Industries Ltd, Japan's largest defense contractor, has been a victim of a cyber attack, according to a report from the company. The company said attackers had gained access to company computer systems, with some reports saying the attacks targeted its submarine, missile and nuclear power plant component businesses.

Like any business decision, make a plan on what new technology you are going to use, then support that plan with enabling security controls to put it into reality.

McAfee announced new security technology this week that leverages Intel hardware and could be used to fight rootkits.Dubbed DeepSafe, the technology enables McAfee to develop hardware-assisted security products that take advantage of a “deeper security footprint,” according to the company. The technology sits below the operating system, which officials hope will allow McAfee to proactively block rootkits that bury themselves in the OS to avoid detection.

The SpyEye Trojan has a well-earned place of respect in cyber-underground as an adaptable and effective piece of malware. Those same traits have also made it a bane for countless victims and the security community, and new research by Trend Micro provides yet another reminder of why.

Security experts from Sourcefire talked up the company’s “Agile Security” strategy this week, emphasizing the need for informed, adaptive and automated security products to protect today's dynamic IT environments from constantly changing threats. The strategy comes down what the company calls four essential tenets:

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Lemonade says the incident is not material and that its operations were not compromised, nor was its customer data targeted.

Cloud Security

Cloud Security

The greatest security policies in the world are useless if enterprises don’t have a reasonable, consistent, and reliable way to implement them.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.