Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

With unapproved AI tools entrenched in daily workflows, experts say it’s time to shift from monitoring to managing Shadow AI use across the enterprise.

Noteworthy stories that might have slipped under the radar: 4chan hacked, auto-reboot security feature coming to Android, Iranian administrator of Nemesis charged in US.

Data protection firm Cy4Data Labs has raised $10 million in a Series A funding round led by Pelion Venture Partners.

Legends International says the personal information of employees and customers was compromised as a result of a cyberattack.

Ahold Delhaize has confirmed that data was stolen from its systems in November 2024 after a ransomware group claimed the attack.

A Windows NTLM vulnerability patched in March has been exploited in attacks targeting government and private institutions.

Minh Phuong Ngoc Vong pleaded guilty to defrauding US companies of roughly $1 million in a fake IT worker scheme.

While the Security Posture Management buzz is real, its long-term viability depends on whether it can deliver measurable outcomes without adding more complexity.

Atlassian and Cisco have released patches for multiple high-severity vulnerabilities, including remote code execution bugs.

Servers exposed to complete takeover due to CVE-2025-32433, an unauthenticated remote code execution flaw in Erlang/OTP SSH.

Our collective voices and one community will provide the intelligence we need to safeguard our businesses in today’s modern digital environment.

People on the Move

DARPA veteran Dan Kaufman has joined Badge as SVP, AI and Cybersecurity.

Kelly Shortridge has been promoted to VP of Security Products at Fastly.

After the passing of Amit Yoran, Tenable has appointed Steve Vintz and Mark Thurmond as co-CEOs.

Former Wiz executive Trish Cagliostro has joined Orchid Security as Chief Revenue Officer.

Transcend has named former UnitedHealth Group CISO Aimee Cardwell as CISO in Residence.

More People On The Move
Privacy of Social Media and Internet Apps Privacy of Social Media and Internet Apps

With unapproved AI tools entrenched in daily workflows, experts say it’s time to shift from monitoring to managing Shadow AI use across the enterprise.

Windows vulnerability exploited Windows vulnerability exploited

A Windows NTLM vulnerability patched in March has been exploited in attacks targeting government and private institutions.

SonicWall vulnerability exploited SonicWall vulnerability exploited

A SonicWall SMA 100 series vulnerability patched in 2021, which went unnoticed at the time of patching, is being exploited in the wild.

Top Cybersecurity Headlines

The vulnerabilities are described as code execution and mitigation bypass issues that affect Apple’s iOS, iPadOS and macOS platforms.

The US government’s cybersecurity agency CISA has “executed the option period on the contract” to keep the vulnerability catalog operational.

China accuses three alleged U.S. NSA operatives of cyberattacks targeting critical infrastructure and the Asian Games in Harbin.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

This webinar will guide you in aligning your security testing strategy with the right tools, helping you move beyond identifying weaknesses to effectively validating your overall security posture.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

Symantec today announced Symantec Certificate Intelligence Center, a cloud-based service for enterprises with large numbers of certificates used for business authentication and data encryption on servers.The solution, powered by VeriSign, discovers, centralizes, and provides reports to help enable organizations to proactively manage certificates from any Certificate Authority (CA). For the first time, enterprises have total visibility and control over their certificates, enabling them to reduce risk, costs and operational inefficiencies.

If Patch Tuesday is a party, this would be the IT security version of pre-gaming.On Aug. 9, Microsoft accidentally released information on the five security updates it is planning to release tomorrow as part of this month’s Patch Tuesday. The information, which has since been taken down, represents a rare procedural slip-up in the company’s Patch process. Normally, Microsoft publishes an advanced notification the Thursday before Patch Tuesday – the second Tuesday of every month – and then posts no...

Oculis Labs, a developer of data privacy software that protects mobile and desktop computers from visual eavesdroppers, today announced a partnership agreement with In-Q-Tel (IQT), the not-for-profit, venture capital arm of the CIA. The company said In-Q-Tel’s relationship and investment would help it accelerate Oculis Labs’ success in both government and commercial markets.

GlobalSign Acknowledges Breach of Web Server - Investigation ContinuesGlobalSign, one of the longest established Certification Authorities (CA), acknowledged late Friday that it found evidence of a breach to a web server hosting its Web site.

Watching Anonymous in action is far better than most of the programming on television. Anonymous seems to be in a never-ending battle against the “evils” that surround mere mortals. Recent past battles have been waged against PayPal, Master Card, Visa and the Church of Scientology. Now Facebook appears to be squarely in Anonymous’ sights.

Microsoft has a relatively light Patch Tuesday planned for next week with no critical patches.According to the company’s pre-patch advisory, Microsoft plans to release five security updates rated ‘Important.’ The bulletins cover issues in Windows, Microsoft Office and Microsoft Server Software such as SharePoint Server and Office Groove Data Bridge Server.

Statistics show an increase in Android devices infected with crimeware that is actively communicating with multiple criminal C&C servers Google Android devices are being caught in a Web of botnet activity at an unprecedented rate, according to new research by security firm Damballa.

IronKey Introduces Trusted Access Platform and Downloadable Secure Browser to Reduce Online Banking RiskIronKey this week introduced a new platform along with a secure browser application, that when used in combination, can protect online banking users from being victimized—even when their systems are infected with some of the nastiest financial malware in existence.

Trusteer today unveiled four product updates designed to anchor its Cybercrime Prevention Architecture.The product updates cover a lot of ground, from technology aimed at blocking browser exploits to fingerprinting machines used by cyber-criminals that attempt to access protected Web applications. The company is also making a play for mobile device security with capabilities aimed at protecting the latest Apple iOS and Google Android devices from financial malware.

In my previous column I presented five commonly used weapons in arsenals of security researchers. This week, we complete the list with a mix of tools and tool types ranging from the old to the new, including tools unveiled for the first time at the recent Black Hat conference. So once again, without further ado, here are some of the tools researchers keep in their security toolbox:

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Lemonade says the incident is not material and that its operations were not compromised, nor was its customer data targeted.

Cloud Security

Cloud Security

The greatest security policies in the world are useless if enterprises don’t have a reasonable, consistent, and reliable way to implement them.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.