Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

A subgroup of the Russia-linked Seashell Blizzard is tasked with broad initial access operations to sustain long-term persistence.

Security and compliance automation firm Drata has acquired trust center platform SafeBase in a quarter billion dollar deal.

Ivanti and Fortinet on Tuesday released patches for multiple critical- and high-severity vulnerabilities in their products.

A new GAO report assesses that the Coast Guard needs to improve Maritime Transportation System (MTS) cybersecurity.

Chipmakers Intel, AMD and Nvidia on Tuesday published new security advisories to inform customers about vulnerabilities found in their products. 

A fresh post on the Kraken ransomware group’s leak website refers to data stolen in a 2022 cyberattack, Cisco says.

Industrial giants Schneider Electric and Siemens have released February 2025 Patch Tuesday ICS security advisories.

On the eve of the Munich Security Conference, Google argues that the cybercriminal threat should be treated as a national security threat like state-backed hacking groups.

The Microsoft Patch Tuesday machine hummed loudly this month with urgent fixes for a pair of already-exploited Windows zero-days.

Patch Tuesday: Adobe patches 45 vulnerabilities across multiple products and warns of remote code execution exploitation risks.

Russia-based bulletproof hosting services provider Zservers was sanctioned for providing services to support LockBit ransomware operations.

People on the Move

Cyber exposure management firm Armis has promoted Alex Mosher to President.

Software giant Atlassian has named David Cross as its new CISO.

Dan Pagel has been named the new CEO of risk management and remediation firm Brinqa.

The City of Phoenix has promoted Mitch Kohlbecker to the role of Chief Information Security Officer.

Gigamon has promoted Tony Jarjoura to CFO and Ram Bhide has been hired as Senior VP of engineering.

More People On The Move
Microsoft Zero-Days Microsoft Zero-Days

The Microsoft Patch Tuesday machine hummed loudly this month with urgent fixes for a pair of already-exploited Windows zero-days.

Intel security Intel security

Intel says roughly 100 of the 374 vulnerabilities it patched last year were firmware and hardware security defects.

iPhone security iPhone security

Cupertino’s security response team said the flaw was used in “an extremely sophisticated attack against specific targeted individuals.” 

Top Cybersecurity Headlines

News analysis: The big AI platforms are emerging as frontline early warning systems, detecting nation-state hackers at the outset of their campaigns. Can this help save the threat intel industry?

SolarWinds will become a privately held company following its acquisition by Turn/River Capital for $4.4 billion in cash. 

Hospital Sisters Health System says the personal information of 883,000 individuals was compromised in a 2023 crippling cyberattack.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Examine the state of cybersecurity in the context of quantum computing and artificial intelligence. Discuss the implications of the new White House administration’s cybersecurity policies and how they will influence the industry’s direction in 2025 and beyond.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Watch Now

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 2025, Stay Tuned]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.(February 26, 2025)

Learn More

Supply Chain Security Summit
Join us as we explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects. (March 19, 2025)

Learn More

Vulnerabilities

Cybercrime

Top 10 Most Dangerous Celebrities OnlineLooking for some hot photos or gossip on your favorite celebrity? Be careful. If you’re looking to dig up some dirt on Cameron Diaz there is a ten percent chance you’ll end up on a malicious site, according to McAfee.

The second quarter Phishing Trends Report from Internet security provider IID  (Internet Identity) indicates that there has been a significant switch in the tactics of cyber criminals, with at least one major gang shifting its entire focus away from phishing to Zeus malware, often referred to as man-in-the-browser malware.

HP to Acquire Fortify SoftwareHP (NYSE:HPQ) announced today that it has signed a definitive agreement to acquire Fortify Software, a privately held software security assurance company based in San Mateo, California.

Entrust IdentityGuard 9.3 Released - Adds Out-of-Band AuthenticationIdentity-based security provider Entrust has announced the immediate availability of out-of-band authentication via its new mobile application, IdentityGuard Mobile. The application is now a component of the company’s Entrust IdentityGuard 9.3 layered security system for mobile devices.

"Contrary to any rumors, the security architecture is the same around the world and RIM truly has no ability to provide its customers’ encryption keys." Authorities in India, in and effort to keep militants and spies off its mobile networks, is demanding access to email and messaging services provided by Research In Motion, maker of BlackBerry.India has given Research In Motion a deadline of August 31st to comply with a request to gain access to encrypted BlackBerry messaging services within...

Mobile Virus Authors Expected to see Android Systems as a Growing TargetGoogle's Android mobile OS has been declared the fastest growing mobile platform according to recent reports, with over 160,000 Android devices being activated every day. This astronomical growth is credited to a friendly user interface and openness of the platform.However, Android's openness has turned its online app store, Android Market, into a breeding ground for malicious applications capable of stealing sensitive user information from the mobile phones. 

Top Five Worst DNS Security IncidentsPreserving Internet security is often an iterative process, with defenders aware that they must be responsive as well as proactive in order to stay one step ahead of would-be attackers. Software developers must respond to vulnerabilities discovered in their code, anti-virus service providers must respond to new variants of malware, and enterprises must repair the holes in their networks when they are found; Promptly.

McAfee Threat Report - Malware Dominates The Threat LandscapeMcAfee has released its 'McAfee Threats Report: Second Quarter 2010' threat analysis report, showing that malware is at an all-time high but that spam has shown slow growth figures when compared to the first quarter of 2010.According to the report, volumes of spam circulating on the internet increased by merely 2.5 percent as compared to Q1'10, after reaching its highest of 175 billion spam emails a day in the third quarter of...

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

San Francisco application security startup raises $100 million in a Series D funding round led by Menlo Ventures. 

Cloud Security

Application Security

APIs are easy to develop, simple to implement, and frequently attacked. They are  prime and lucrative targets for cybercriminals. 

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.