Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Noteworthy stories that might have slipped under the radar: Capital One hacker’s sentence reversed, Google patches critical Chrome vulnerability, the story of an Expat flaw. 

The Cloak ransomware group has claimed responsibility for a February cyberattack on Virginia Attorney General’s Office.

Join the virtual event as we explore of the critical nature of software and vendor supply chain security issues.

Cato Networks discovers a new LLM jailbreak technique that relies on creating a fictional world to bypass a model’s security controls.

The FishMonger APT group, a subdivision of Chinese cybersecurity firm I-Soon, compromised seven organizations in a 2022 campaign.

Industry professionals comment on Google acquiring cloud security giant Wiz for $32 billion in cash.

The Hellcat ransomware group claims to have stolen tens of gigabytes of data from Ascom and Jaguar Land Rover.

Former NFL and University of Michigan assistant football coach Matt Weiss hacked into the computer accounts of thousands of college athletes seeking intimate photos and videos.

More details have come to light on the recent supply chain attack targeting GitHub Actions, including its root cause.

Analysis reveals a 140% increase in browser phishing, including a 130% increase in zero-hour phishing attacks.

Real-time event and risk detection firm Dataminr has raised $85 million from NightDragon and HSBC to accelerate AI development.

People on the Move

Life360 has appointed Vari Bindra, former Amazon cybersecurity lead, as Chief Information Security Officer.

Forcepoint has appointed Guy Shamilov as CISO, Bakshi Kohli as CTO and Naveen Palavalli as CPO and CMO.

Paul Calatayud has been named CISO of developer security posture management firm Archipelo.

Cyber readiness and response firm Sygnia has appointed Avi Golan as its new CEO.

Cybersecurity firm Absolute Security announced Harold Rivas as its new CISO.

More People On The Move
GitHub supply chain attack GitHub supply chain attack

More details have come to light on the recent supply chain attack targeting GitHub Actions, including its root cause.

WhatsApp Exploits WhatsApp Exploits

Attacks involving Paragon’s Graphite spyware involved a WhatsApp zero-day that could be exploited without any user interaction.

Google acquires Wiz Google acquires Wiz

News analysis: Google positions itself to compete with Microsoft for enterprise security dollars. How does this deal affect startup ecosystem?

Top Cybersecurity Headlines

A long-running campaign phishing for credentials through scareware recently switched to targeting macOS users.

Google has confirmed reports that it’s buying cloud security giant Wiz and says it’s prepared to pay $32 billion in cash.

A year-old vulnerability in a third-party ChatGPT tool is being exploited against financial entities and US government organizations.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

This webinar will guide you in aligning your security testing strategy with the right tools, helping you move beyond identifying weaknesses to effectively validating your overall security posture.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

This event delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Learn More

Supply Chain Security Summit
Join us as we explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects. (March 19, 2025)

Learn More

Vulnerabilities

Cybercrime

McAfee Threat Report - Malware Dominates The Threat LandscapeMcAfee has released its 'McAfee Threats Report: Second Quarter 2010' threat analysis report, showing that malware is at an all-time high but that spam has shown slow growth figures when compared to the first quarter of 2010.According to the report, volumes of spam circulating on the internet increased by merely 2.5 percent as compared to Q1'10, after reaching its highest of 175 billion spam emails a day in the third quarter of...

Toshiba has rolled out a new technology for its self-encrypting hard disks that provides additional security features to prevent data leakage. The Japan based company said that Wipe technology for its SED models was capable of automatically deleting sensitive user information stored on the HDDs when the system is turned-off or the hard drive is removed from the system.

Cybercrime Trends for 2010 - 2010 Mid-Year Report from SonicWALLSonicWALL has released its mid-year 'top cybercrime trends for 2010' report which details the current and future security threats faced by organizations the world over.The report, compiled from the data collected by the company's Global Response Intelligence Defense (GRID) network servers, suggests that trends in social networking, cloud computing and remote use of smartphones pose a major threat to organizations.

Foxit Reader Updated to Address Security Issues Caused by iPhone & iPad Jailbreak ProgramFoxit has released Foxit Reader 4.1.1.0805 to address a vulnerability associated with the improper rendering of PDF documents.The Foxit Reader update fixes the crash issue caused by the new iPhone/iPad jailbreak program, which can be exploited to inject arbitrary code into a system and execute it there. Exploitation of the vulnerability may allow an attacker to execute arbitrary code.

Microsoft has released the advanced notification for its upcoming Patch Tuesday security update release, in which the company will be issuing 14 security bulletins that cover 34 vulnerabilities found in Windows, Office and Silverlight software.The upcoming Patch Tuesday release is one of the biggest patch releases made by Microsoft for a long time. However, the company denied it to be its largest ever.

IntraLinks IPO - Cloud Security Provider Goes Public on New York Stock Exchange, Raises $143 MillionIntraLinks Holdings (NYSE:IL), a provider of cloud-based solutions that help enterprises securely manage content, exchange business information and collaborate within and among organizations, went public today (its third attempt) and started trading on the New York Stock Exchange.

Data security vendor Imperva and data masking solutions provider ActiveBase, are partnering to offer a comprehensive protection solution for sensitive data.The partnership, announced this week, will allow joint customers to protect sensitive data from those who don't need to see it. The solution, for example, will allow personal data to be shielded from IT personnel such as outsourced support teams and protect personal information in training and development environments.

Securing the Extended EnterpriseAs corporations expand their reliance on the Internet and technology to conduct business, most work diligently to reduce their exposure to attack. Their efforts are focused primarily on protecting their enterprise assets, but could they be missing a very important aspect of their attack surface…. the extended enterprise?

Signature Based Anti-Virus Test Results - Vendors Struggle to Keep up with ThreatsThe most popular signature-based antivirus (AV) solutions detect on average less than 19% of malware threats, according to a new report released today by IT security vendor Cyveillance. However, that detection rate increases to 61.7% after 30 days, although even this rate could hardly be seen as comforting.

Security solutions provider Rapid7 has launched the latest version of its vulnerability management solution, NeXpose, which will help local governments and private enterprises adhere to Federal Information Processing Standard (FIPS) 140-2 Certification requirements.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Google has integrated OSV-SCALIBR features into OSV-Scanner, its free vulnerability scanner for open source developers.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.