Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Details have been disclosed for an eSIM hacking method that could impact many, but the industry is taking action.

Ingram Micro has restored operations across all countries and regions after disconnecting systems to contain a ransomware attack.

Three teens and a woman have been arrested by the UK’s NCA over the hacking of M&S, Co-op and Harrods.

Hackers compromised names, addresses, email address, phone numbers, and other information pertaining to Qantas customers.

‘Machine identities’, often used interchangeably with ‘non-human identities’ (NHIs), have been increasing rapidly since the start of digital transformation.

PCA Cyber Security has discovered critical vulnerabilities in the BlueSDK Bluetooth stack that could have allowed remote code execution on car systems.

AI-made decisions are in many ways shaping and governing human lives. Companies have a moral, social, and fiduciary duty to responsibly lead its take-up.

AI-powered MDR provider AirMDR has raised $15.5 million in funding (seed and infusion investment) to support its R&D efforts.

Nippon Steel Solutions has disclosed a data breach that resulted from the exploitation of a zero-day in network equipment.

New Samsung Galaxy features include protections for on-device AI, expanded cross-device threat detection, and quantum-resistant encryption for network security.

Industrial solutions providers Siemens, Schneider Electric and Phoenix Contact have released July 2025 Patch Tuesday ICS security advisories.

People on the Move

Jessica Newman has joined Sophos as General Manager of Global Cyber Insurance.

Breach and attack simulation solutions provider AttackIQ has appointed Pete Luban as Field Chief Information Security Officer.

Matthew Cowell has assumed the role of VP of Strategic Alliances at Nozomi Networks. He previously served in the same role at Dragos.

Bret Arsenault is retiring from his full-time role after 35 years at Microsoft.

Social engineering defense platform Doppel has appointed Bobby Ford as Chief Strategy and Experience Officer.

More People On The Move
Car hacking Car hacking

PCA Cyber Security has discovered critical vulnerabilities in the BlueSDK Bluetooth stack that could have allowed remote code execution on car systems.

Nippon Steel data breach Nippon Steel data breach

Nippon Steel Solutions has disclosed a data breach that resulted from the exploitation of a zero-day in network equipment.

Chinese hacker arrested Chinese hacker arrested

Xu Zewei has been arrested on charges that he is a member of the Chinese state-sponsored hacking group Hafnium (Silk Typhoon).

Top Cybersecurity Headlines

As organizations rush to adopt agentic AI, security leaders must confront the growing risk of invisible threats and new attack vectors.

Researchers released technical information and exploit code targeting a critical vulnerability (CVE-2025-5777) in Citrix NetScaler.

The notorious Hive successor ceases ransomware operations but pivots to pure data extortion under the new World Leaks brand.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

This online session will explore resilience planning in response to geopolitical tensions and help CISOs navigate the current state of federal cybersecurity initiatives.

Register

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

Microsoft has a relatively light Patch Tuesday planned for next week with no critical patches.According to the company’s pre-patch advisory, Microsoft plans to release five security updates rated ‘Important.’ The bulletins cover issues in Windows, Microsoft Office and Microsoft Server Software such as SharePoint Server and Office Groove Data Bridge Server.

Statistics show an increase in Android devices infected with crimeware that is actively communicating with multiple criminal C&C servers Google Android devices are being caught in a Web of botnet activity at an unprecedented rate, according to new research by security firm Damballa.

IronKey Introduces Trusted Access Platform and Downloadable Secure Browser to Reduce Online Banking RiskIronKey this week introduced a new platform along with a secure browser application, that when used in combination, can protect online banking users from being victimized—even when their systems are infected with some of the nastiest financial malware in existence.

Trusteer today unveiled four product updates designed to anchor its Cybercrime Prevention Architecture.The product updates cover a lot of ground, from technology aimed at blocking browser exploits to fingerprinting machines used by cyber-criminals that attempt to access protected Web applications. The company is also making a play for mobile device security with capabilities aimed at protecting the latest Apple iOS and Google Android devices from financial malware.

In my previous column I presented five commonly used weapons in arsenals of security researchers. This week, we complete the list with a mix of tools and tool types ranging from the old to the new, including tools unveiled for the first time at the recent Black Hat conference. So once again, without further ado, here are some of the tools researchers keep in their security toolbox:

As more and more digital technology is introduced into automobiles, the threat of malicious software and hardware manipulation increases. ISec Partners’ researchers got a lot of attention at Black Hat this year when they demonstrated how to start a car’s engine via text message. As it turns out, that was just the latest of several examples of how attackers can turn the electrical systems in your car into their own personal lock pick.

GlobalSign, one of the longest established Certification Authorities (CA) today said it would temporarily cease issuance of all digital certificates following a claim that the same hacker responsible for the recent DigiNotar hack had access to four other Certificate Authorities, and named GlobalSign as one of them.The company posted the following announcement on the incident on Tuesday afternoon:

Veracode today shared a newly created infographic that summarizes the techniques News of the World reporters used to pull off nefarious schemes including bribery, cracking insecure passwords, caller ID spoofing and social engineering.The infographic, titled, “News of the Scandal: The Story That Destroyed a 168 Year Old Newspaper” provides a detailed timeline with pivotal events, key players and technology-enabled privacy breaches that destroyed the 168 year old publication.

A former vice president in Citigroup's treasury finance department, pleaded guilty today to bank fraud arising from his embezzlement of more than $22 million from Citigroup. The defendant, Gary Foster, entered his plea before a United States District Judge at a Federal Courthouse in Brooklyn.

Imperva, a soon to go public provider of data security solutions, today launched a cloud-based service designed to help businesses defend against Distributed Denial of Service (DDoS) attacks.

The gap between vulnerability and protection is a distance that can be measured both by the amount of time that sensitive database information goes un-patched and by the extent of damage caused by a potential data breach. While organizations understand the stakes involved in leaving their systems un-patched, quite often they do not install patches in a timely manner. Is there a convenient and reliable way to bridge this gap?

In response to a series of cyber attacks that resulted in the personal information of more than 100 Million customers falling into the hands of hackers, Sony today announced that it has hired Philip R. Reitinger, a former U.S. Homeland Security official in charge of cyber security, as Senior Vice President and Chief Information Security Officer.

According to VeriSign, more than five million domain names were added to the Internet in the second quarter of 2011, bringing the total number of registered domain names to more than 215 million worldwide across all domains.The increase of 5.2 million domain names marks a growth rate of 2.5 percent over the first quarter.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

RevEng.ai has raised $4.15 million in seed funding for an AI platform that automatically detects malicious code and vulnerabilities in software.

Cloud Security

Cloud Security

Founded in 2015, the Tel Aviv based company has now raised more than $1 billion and claims more than 3,500 customers.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.