Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Redmond’s AI Red Team says human involvement remains irreplaceable in addressing nuanced risks.

A fake proof-of-concept (PoC) exploit for a recent LDAP vulnerability distributes information stealer malware.

The US Justice Department has announced charges against three Russians for operating the Blender and Sinbad cryptocurrency mixers.

Developed with the help of AI, the emerging FunkSec ransomware claimed over 80 victims in December 2024.

Juniper Networks has patched multiple high-severity vulnerabilities in Junos OS and its third-party components.

Chinese cyberspies targeted offices dealing with foreign investments and sanctions in the recent US Treasury hack. 

If the deal is sealed, SpaceX would provide encryption services for the Italian government and communications infrastructure for the military and emergency services.

Noteworthy stories that might have slipped under the radar: 2025 trucking cybersecurity report, Bank of America discloses data breach, Silk Typhoon behind US Treasury hack.

The latest version of the Banshee macOS information stealer no longer checks if the infected systems have the Russian language installed.

Substance abuse treatment provider BayMark Health Services says patient personal information was compromised in a data breach.

Fortinet warns of a phishing campaign that uses legitimate links to take over the victims’ PayPal accounts.

People on the Move

Cloud security giant Wiz has named Fazal Merchant as President and Chief Financial Officer.

Cybersecurity and data protection company Acronis has appointed Gerald Beuchelt as CISO.

Adam Zoller has joined CrowdStrike as Chief Information Security Officer.

Ekta Singh-Bushell is the first COO of industrial cybersecurity company Dragos.

Threat intelligence firm Flashpoint has appointed David Lemon as President.

More People On The Move
Treasury Hacked by China Treasury Hacked by China

Chinese cyberspies targeted offices dealing with foreign investments and sanctions in the recent US Treasury hack. 

Streaming platform DRM hacking Streaming platform DRM hacking

A research project into vulnerabilities affecting Microsoft’s PlayReady DRM raises some questions on responsible disclosure.

Ivanti vulnerability exploited Ivanti vulnerability exploited

Google Cloud’s Mandiant has linked the exploitation of CVE-2025-0282, a new Ivanti VPN zero-day, to Chinese cyberspies.

Top Cybersecurity Headlines

Ivanti confirms zero-day exploitation of a remotely exploitable code execution flaw in its Connect Security product line.

After its CEO was arrested last summer, Telegram has been increasingly sharing user data at the request of authorities.

The insider threat problem will worsen, and the solutions will widen, in the age of generative-AI.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Explore trends and technologies that will shape the future of cybersecurity. Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 2025, Stay Tuned]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.(February 26, 2025)

Learn More

Supply Chain Security Summit
Join us as we explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects. (March 19, 2025)

Learn More

Vulnerabilities

Cybercrime

HP to Acquire Fortify SoftwareHP (NYSE:HPQ) announced today that it has signed a definitive agreement to acquire Fortify Software, a privately held software security assurance company based in San Mateo, California.

Entrust IdentityGuard 9.3 Released - Adds Out-of-Band AuthenticationIdentity-based security provider Entrust has announced the immediate availability of out-of-band authentication via its new mobile application, IdentityGuard Mobile. The application is now a component of the company’s Entrust IdentityGuard 9.3 layered security system for mobile devices.

"Contrary to any rumors, the security architecture is the same around the world and RIM truly has no ability to provide its customers’ encryption keys." Authorities in India, in and effort to keep militants and spies off its mobile networks, is demanding access to email and messaging services provided by Research In Motion, maker of BlackBerry.India has given Research In Motion a deadline of August 31st to comply with a request to gain access to encrypted BlackBerry messaging services within...

Mobile Virus Authors Expected to see Android Systems as a Growing TargetGoogle's Android mobile OS has been declared the fastest growing mobile platform according to recent reports, with over 160,000 Android devices being activated every day. This astronomical growth is credited to a friendly user interface and openness of the platform.However, Android's openness has turned its online app store, Android Market, into a breeding ground for malicious applications capable of stealing sensitive user information from the mobile phones. 

Top Five Worst DNS Security IncidentsPreserving Internet security is often an iterative process, with defenders aware that they must be responsive as well as proactive in order to stay one step ahead of would-be attackers. Software developers must respond to vulnerabilities discovered in their code, anti-virus service providers must respond to new variants of malware, and enterprises must repair the holes in their networks when they are found; Promptly.

McAfee Threat Report - Malware Dominates The Threat LandscapeMcAfee has released its 'McAfee Threats Report: Second Quarter 2010' threat analysis report, showing that malware is at an all-time high but that spam has shown slow growth figures when compared to the first quarter of 2010.According to the report, volumes of spam circulating on the internet increased by merely 2.5 percent as compared to Q1'10, after reaching its highest of 175 billion spam emails a day in the third quarter of...

Toshiba has rolled out a new technology for its self-encrypting hard disks that provides additional security features to prevent data leakage. The Japan based company said that Wipe technology for its SED models was capable of automatically deleting sensitive user information stored on the HDDs when the system is turned-off or the hard drive is removed from the system.

Cybercrime Trends for 2010 - 2010 Mid-Year Report from SonicWALLSonicWALL has released its mid-year 'top cybercrime trends for 2010' report which details the current and future security threats faced by organizations the world over.The report, compiled from the data collected by the company's Global Response Intelligence Defense (GRID) network servers, suggests that trends in social networking, cloud computing and remote use of smartphones pose a major threat to organizations.

Foxit Reader Updated to Address Security Issues Caused by iPhone & iPad Jailbreak ProgramFoxit has released Foxit Reader 4.1.1.0805 to address a vulnerability associated with the improper rendering of PDF documents.The Foxit Reader update fixes the crash issue caused by the new iPhone/iPad jailbreak program, which can be exploited to inject arbitrary code into a system and execute it there. Exploitation of the vulnerability may allow an attacker to execute arbitrary code.

Microsoft has released the advanced notification for its upcoming Patch Tuesday security update release, in which the company will be issuing 14 security bulletins that cover 34 vulnerabilities found in Windows, Office and Silverlight software.The upcoming Patch Tuesday release is one of the biggest patch releases made by Microsoft for a long time. However, the company denied it to be its largest ever.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Cloud Security

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.