Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Redmond’s AI Red Team says human involvement remains irreplaceable in addressing nuanced risks.

A fake proof-of-concept (PoC) exploit for a recent LDAP vulnerability distributes information stealer malware.

The US Justice Department has announced charges against three Russians for operating the Blender and Sinbad cryptocurrency mixers.

Developed with the help of AI, the emerging FunkSec ransomware claimed over 80 victims in December 2024.

Juniper Networks has patched multiple high-severity vulnerabilities in Junos OS and its third-party components.

Chinese cyberspies targeted offices dealing with foreign investments and sanctions in the recent US Treasury hack. 

If the deal is sealed, SpaceX would provide encryption services for the Italian government and communications infrastructure for the military and emergency services.

Noteworthy stories that might have slipped under the radar: 2025 trucking cybersecurity report, Bank of America discloses data breach, Silk Typhoon behind US Treasury hack.

The latest version of the Banshee macOS information stealer no longer checks if the infected systems have the Russian language installed.

Substance abuse treatment provider BayMark Health Services says patient personal information was compromised in a data breach.

Fortinet warns of a phishing campaign that uses legitimate links to take over the victims’ PayPal accounts.

People on the Move

Cloud security giant Wiz has named Fazal Merchant as President and Chief Financial Officer.

Cybersecurity and data protection company Acronis has appointed Gerald Beuchelt as CISO.

Adam Zoller has joined CrowdStrike as Chief Information Security Officer.

Ekta Singh-Bushell is the first COO of industrial cybersecurity company Dragos.

Threat intelligence firm Flashpoint has appointed David Lemon as President.

More People On The Move
Treasury Hacked by China Treasury Hacked by China

Chinese cyberspies targeted offices dealing with foreign investments and sanctions in the recent US Treasury hack. 

Streaming platform DRM hacking Streaming platform DRM hacking

A research project into vulnerabilities affecting Microsoft’s PlayReady DRM raises some questions on responsible disclosure.

Ivanti vulnerability exploited Ivanti vulnerability exploited

Google Cloud’s Mandiant has linked the exploitation of CVE-2025-0282, a new Ivanti VPN zero-day, to Chinese cyberspies.

Top Cybersecurity Headlines

Ivanti confirms zero-day exploitation of a remotely exploitable code execution flaw in its Connect Security product line.

After its CEO was arrested last summer, Telegram has been increasingly sharing user data at the request of authorities.

The insider threat problem will worsen, and the solutions will widen, in the age of generative-AI.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Explore trends and technologies that will shape the future of cybersecurity. Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 2025, Stay Tuned]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.(February 26, 2025)

Learn More

Supply Chain Security Summit
Join us as we explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects. (March 19, 2025)

Learn More

Vulnerabilities

Cybercrime

Mobile Device Management Security a Top ConcernA recent survey conducted by security firm McAfee has revealed that around 76 percent organizations are planning to implement at least one key mobility initiative to improve their operations within the next 6 to 12 months.

"Mariposa botnet" - Butterfly botnet kit Author Arrested“Iserdo,” the confirmed author of the Butterfly botnet kit, was arrested recently in Maribor, Slovenia, by Slovenian authorities working with the FBI. The 23-year-old master hacker known only by his Internet handle is allegedly the mastermind behind the code used to build the Mariposa botnet, which has compromised millions of systems worldwide. He is currently free on bail.

Microsoft this week announced an agreement to collaborate with Adobe systems and facilitate advanced information sharing on vulnerabilities via its Microsoft Active Protections Program (MAPP), which Adobe will join. MAPP is a collaborative effort involving 65 global members that facilitates the sharing of product vulnerabilities with security software providers. Adobe will join the program in the fall of this year.

The presentation "Jackpotting Automated Teller Machines" was originally on the schedule at Black Hat USA 2009 but the talk was pulled at the last minute. This year it was on! Videos of Barnaby Jack demonstrating both local and remote attacks and a multi-platform ATM rootkit.Barnaby Jack Hacks ATMs Remotely At Black Hat

The presentation "Jackpotting Automated Teller Machines" was originally on the schedule at Black Hat USA 2009 but the talk was pulled at the last minute. This year it was on! and... it just happened today. We are in the process of uploading VIDEOS of the ATM hacking demonstration but the pipes are a little slow from Vegas today. In the meantime, here are a few photos. Check back later tonight and we'll have the actual videos of Barnaby Jack demonstrating...

CA Technologies (NASDAQ:CA) today announced that its identity and access management (IAM) technology now supports the Google Apps™ suite, which includes the familiar and widely-used Gmail and Google Docs applications. This means that companies can now use the same identity/access management system for both internal and external (Google) applications.

A shocking 87 percent of the victims in a study of data breaches jointly conducted by Verizon and the U.S. Secret Service had evidence of the breach in their log files, yet missed it. According to the 2010 Verizon Data Breach Investigations Report, 60 percent of breaches were discovered by external parties, and then only after a considerable amount of time.Most breaches were considered avoidable if security basics had been followed Only 4 percent of breaches assessed required difficult and...

Solera Networks, a provider of network forensics and network monitoring solutions, announced today that it has closed $15 million in Series C financing. Trident Capital lead the round as a new investor and was also joined by Allegis Capital and Canopy Ventures who were previous investors.

Cisco Global Threat Report - 2Q10For the first time since tracking began in 2007, the number of unique web-based malware hosts and malware URLs didn’t increase, according to Cisco’s Quarterly Global Threat Report just issued for the second quarter of 2010.

App Genome Project Enables Rapid Identification of Bad Applications San Francisco based Smartphone security company, Lookout, today unveiled plans for an initiative to map and study mobile applications in order to identify security threats and provide insight into how applications are tapping into personal data and accessing other phone resources.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Cloud Security

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.