Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Mitel has announced patches for a MiCollab path traversal vulnerability that can be exploited remotely without authentication.

Trend Micro patches critical-severity Apex Central and Endpoint Encryption PolicyServer flaws leading to remote code execution.

ZeroRISC has raised $10 million in seed funding for production-grade open source silicon security, built on OpenTitan designs.

Citizen Lab publishes forensic proof that spyware maker Paragon can compromise up-to-date iPhones. Journalists in Europe among victims.

AI-generated voice deepfakes have crossed the uncanny valley, fueling a surge in fraud that outpaces traditional security measures. Detection technology is racing to keep up.

Hirundo tackles AI hallucinations and bias by making trained models “forget” poisoned, malicious, and confidential data.

The new attack technique uses smartwatches to capture ultrasonic covert communication in air-gapped environments and exfiltrate data.

Learn how attackers hide in plain sight—and what you can do to stop them without slowing down your business.

Microsoft recently patched CVE-2025-32711, a vulnerability that could have been used for zero-click attacks to steal data from Copilot.

It’s time for enterprises to stop treating unmanaged devices as an edge case and start securing them as part of a unified Zero Trust strategy.

Between May 2024 and April 2025, Cloudflare blocked 109 billion malicious requests targeting organizations protected under Project Galileo.

People on the Move

SAP security firm SecurityBridge announced the appointment of Roman Schubiger as the company’s new CRO.

Cybersecurity training and simulations provider SimSpace has appointed Peter Lee as Chief Executive Officer.

Orchid Security has appointed a new Chief Product Officer and three advisors.

Kaseya has appointed Rania Succar as Chief Executive Officer.

Identity security company Silverfort has appointed Howard Greenfield as President and Chief Revenue Officer.

More People On The Move
Mitel MiCollab vulnerabilities Mitel MiCollab vulnerabilities

Mitel has announced patches for a MiCollab path traversal vulnerability that can be exploited remotely without authentication.

SmartAttack air gap attack SmartAttack air gap attack

The new attack technique uses smartwatches to capture ultrasonic covert communication in air-gapped environments and exfiltrate data.

Interpol targets infostealers Interpol targets infostealers

Interpol has announced a crackdown on infostealer malware in Asia as part of an effort called Operation Secure.

Top Cybersecurity Headlines

Series E funding round brings Cyera’s total funding to over $1.3 billion and values the data security firm at $6 billion.

Redmond warns that external control of a file name or path in WebDAV “allows an unauthorized attacker to execute code over a network.”

United Natural Foods has taken some systems offline after detecting unauthorized activity on its IT systems, causing disruptions to operations.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Register

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

A joint study released this week by ThreatMetrix and the Ponemon Institute, looks at the increase in mobile commerce activity, and how this trend plays a role in the prominence of fraudulent mobile transactions. The study examined how comfortable consumers are with sharing their mobile location with a company. More than half of respondents said they would be willing to share this information if it meant protecting against online fraud.

In early May, the Michaels art supply chain reported that 90 PIN pads within some of its 995 stores nationwide had been compromised, with victims reporting fraudulent withdrawals of up to $500 made from ATMs on the West Coast against their credit and debit card accounts. While 90 units represents less than 1 percent of the total, Michaels took the extraordinary precaution of removing the approximately 7,200 comparable PIN pads from all its US stores. The company was also monitoring...

Red Hat today announced the availability of Red Hat Enterprise Linux 6.1, the first update to the platform since the delivery of Red Hat Enterprise Linux 6 in November 2010. With Red Hat Enterprise Linux 6.1, Red Hat continues to set the standard in flexibility, performance and quality that customers around the world rely on for their open source enterprise environments, spanning physical, virtual and cloud deployments.

According to recent survey findings coming from CyberSource, a Visa company, airlines lost an estimated $1.4 billion due to online payment fraud in 2010. But with so many security checks that come along with air travel, how is this possible? A typical fraud scenario in the airline industry plays out like this:

In February 2011, the clock finally ran out on IPv4, the trusty Internet Protocol that has been used to connect networked computers for the last 30 years. The Internet Assigned Numbers Authority (IANA), which manages the master pool of IP addresses, assigned its last five blocks of IPv4 space to the world's five Regional Internet Registries.

BeyondTrust today announced the acquisition of Lumigent Technologies, a Massachusetts-based provider of database security and activity monitoring solutions.As a result of the acquisition, BeyondTrust today announced PowerBroker Database, a solution that provides IT security departments with the ability to closely monitor database activity of privileged users, assess system configurations, and capture, alert, and report on changes to critical system configuration and business data.

Threats to our networks are faster, smarter, more prevalent, more targeted, and more elusive than ever before. At the same time, the number and types of operating systems, applications and services running on the network continue to grow. Gaining visibility into different user types – remote, mobile, third-parties, and by job function – and accommodating their unique requirements adds even greater complexity when it comes to protecting our IT infrastructure.

IT Security and data protection company Sophos today announced the availability of a number of new and enhanced mobile management and protection products for enterprises.

For nearly a year, 22 year-old Lucas Henderson of Texas has been creating and distributing fake coupons, resulting in hundreds of thousands of dollars lost by retailers and manufacturers. He surrendered in federal court last week.

A group of security and privacy researchers from the Institute of Media Informatics at Ulm University in Germany, is claiming to have discovered a serious security vulnerability in Google's ClientLogin protocol.In a recent analysis of the Android platform, the group discovered that when Android users are connected to an unencrypted open Wifi network, an attacker could both read transmitted synchronization data of Google Contacts, Calendar and Picasa Web Albums, and capture the authToken that’s user for authentication.

Autonomy Corporation, with dual headquarters in Cambridge, England and San Francisco, California, announced that it would acquire certain assets from Iron Mountain's digital division including archiving, eDiscovery, and online backup for $380 million in cash.The acquisition of assets will bring over six petabytes of data under management and more than 6,000 customers to Autonomy's customer base, bringing its private cloud data to over 25 petabytes and total customer base to over 25,000.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Security researchers uncover critical flaws and widespread misconfigurations in Salesforce’s industry-specific CRM solutions.

Cloud Security

Artificial Intelligence

Maze and its investors are betting on finding profits in software that uses AI-powered agents to automate critical parts of the process.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.