Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Sentra has now raised north of $100 million for controls technology to keep sensitive data out of misconfigured AI workflows.

DataKrypto’s FHEnom for AI combines real-time homomorphic encryption with trusted execution environments to protect enterprise data and models from leakage, exposure, and tampering.

The city of Abilene, Texas, is scrambling to restore systems that have been taken offline in response to a cyberattack.

A vulnerability in SSL.com has resulted in nearly a dozen certificates for legitimate domains being wrongly issued.

Hopper has emerged from stealth mode with a solution designed to help organizations manage open source software risk.

Security researchers detail various malware campaigns that use bulletproof services linked to Proton66 ASN.

A sophisticated phishing campaign abuses weakness in Google Sites to spoof Google no-reply addresses and bypass protections.

Transnational organized crime groups in East and Southeast Asia are spreading their lucrative scam operations across the globe, according to a UN report.

Bell Ambulance and Alabama Ophthalmology Associates have suffered data breaches affecting over 100,000 people after being targeted in ransomware attacks.

Microsoft security chief Charlie Bell says the SFI’s 28 objectives are “near completion” and that 11 others have made “significant progress.”

North Korean cryptocurrency thieves abusing Zoom Remote collaboration feature to target cryptocurrency traders with malware.

People on the Move

DARPA veteran Dan Kaufman has joined Badge as SVP, AI and Cybersecurity.

Kelly Shortridge has been promoted to VP of Security Products at Fastly.

After the passing of Amit Yoran, Tenable has appointed Steve Vintz and Mark Thurmond as co-CEOs.

Former Wiz executive Trish Cagliostro has joined Orchid Security as Chief Revenue Officer.

Transcend has named former UnitedHealth Group CISO Aimee Cardwell as CISO in Residence.

More People On The Move
Microsoft vulnerability Microsoft vulnerability

Microsoft security chief Charlie Bell says the SFI’s 28 objectives are “near completion” and that 11 others have made “significant progress.”

Privacy of Social Media and Internet Apps Privacy of Social Media and Internet Apps

With unapproved AI tools entrenched in daily workflows, experts say it’s time to shift from monitoring to managing Shadow AI use across the enterprise.

Windows vulnerability exploited Windows vulnerability exploited

A Windows NTLM vulnerability patched in March has been exploited in attacks targeting government and private institutions.

Top Cybersecurity Headlines

A SonicWall SMA 100 series vulnerability patched in 2021, which went unnoticed at the time of patching, is being exploited in the wild.

The vulnerabilities are described as code execution and mitigation bypass issues that affect Apple’s iOS, iPadOS and macOS platforms.

The US government’s cybersecurity agency CISA has “executed the option period on the contract” to keep the vulnerability catalog operational.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

This webinar will guide you in aligning your security testing strategy with the right tools, helping you move beyond identifying weaknesses to effectively validating your overall security posture.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

A new study by NSS Labs places Internet Explorer 9 (IE9) at the top of the heap when it comes to blocking socially-engineered malware attacks.With its SmartScreen Filter and Application Reputation technologies enabled, IE9 was able to block 99.2 percent of live threats globally during a test conducted between May 27 and June 10. The test stacked IE up against Google Chrome 12, Apple Safari 5, Mozilla Firefox 4 and Opera 11, and included a list of roughly 1,200 malicious...

Following ZeuS, SpyEye Source Code is Leaked to the PublicThe SpyEye malware kit has long been both the bane of unsuspecting victims and a boon for cyber-criminals. Now, according to security firm Damballa, the situation may have taken a turn for the worse.

In my previous column, I outlined how software vendors can best identify if they have a piracy problem. Once software piracy is identified it is important to know the scope of the problem because it will help to determine the best way to deal with it. Once an Independent Software Vendor (ISV) discovers that their software has been pirated, the gut reaction is to put an immediate stop to it. After all, this is their life’s work.

Google today announced that it would acquire Motorola Mobility Holdings, Inc. (NYSE: MMI) for approximately $12.5 billion in cash.Representing a premium of 63% to the closing price of Motorola Mobility shares on Friday, August 12, 2011, Google will pay $40 per share in cash for the company.

Battle over Attribution Continues, China a Major Victim of Cyber AttacksA senior cyber-security official in China said recently that the country wants to work with other nations to improve cyber security. Yet along with this pledge came another example of the back and forth between nation-states that has become a common feature of many public discussions about security. This time however, it was China pointing fingers at the United States.

Intel Capital, Intel's global investment arm, today announced that it has created a $300 million Ultrabook™ Fund to help drive innovation of Intel's vision of a new class of mobile computers that marry the performance and capabilities of today’s laptops with tablet-like features and deliver a highly responsive and secure experience, in a thin and light form factor.

The recent high-flying tech IPO landscape has come to a halt over the past week as financial markets tumbled and have remained especially volatile in the past several sessions following the first-ever credit downgrade of the United States.

A recent survey from Mocana has found that 24 percent of respondents knew of security problems in their company’s products that had not been disclosed to the public before the devices were shipped, but just what that means in terms of attitudes towards security may be more complex than it seems.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Cloud Security

Cloud Security

The greatest security policies in the world are useless if enterprises don’t have a reasonable, consistent, and reliable way to implement them.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.