Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Noteworthy stories that might have slipped under the radar: Capital One hacker’s sentence reversed, Google patches critical Chrome vulnerability, the story of an Expat flaw. 

The Cloak ransomware group has claimed responsibility for a February cyberattack on Virginia Attorney General’s Office.

Join the virtual event as we explore of the critical nature of software and vendor supply chain security issues.

Cato Networks discovers a new LLM jailbreak technique that relies on creating a fictional world to bypass a model’s security controls.

The FishMonger APT group, a subdivision of Chinese cybersecurity firm I-Soon, compromised seven organizations in a 2022 campaign.

Industry professionals comment on Google acquiring cloud security giant Wiz for $32 billion in cash.

The Hellcat ransomware group claims to have stolen tens of gigabytes of data from Ascom and Jaguar Land Rover.

Former NFL and University of Michigan assistant football coach Matt Weiss hacked into the computer accounts of thousands of college athletes seeking intimate photos and videos.

More details have come to light on the recent supply chain attack targeting GitHub Actions, including its root cause.

Analysis reveals a 140% increase in browser phishing, including a 130% increase in zero-hour phishing attacks.

Real-time event and risk detection firm Dataminr has raised $85 million from NightDragon and HSBC to accelerate AI development.

People on the Move

Life360 has appointed Vari Bindra, former Amazon cybersecurity lead, as Chief Information Security Officer.

Forcepoint has appointed Guy Shamilov as CISO, Bakshi Kohli as CTO and Naveen Palavalli as CPO and CMO.

Paul Calatayud has been named CISO of developer security posture management firm Archipelo.

Cyber readiness and response firm Sygnia has appointed Avi Golan as its new CEO.

Cybersecurity firm Absolute Security announced Harold Rivas as its new CISO.

More People On The Move
GitHub supply chain attack GitHub supply chain attack

More details have come to light on the recent supply chain attack targeting GitHub Actions, including its root cause.

WhatsApp Exploits WhatsApp Exploits

Attacks involving Paragon’s Graphite spyware involved a WhatsApp zero-day that could be exploited without any user interaction.

Google acquires Wiz Google acquires Wiz

News analysis: Google positions itself to compete with Microsoft for enterprise security dollars. How does this deal affect startup ecosystem?

Top Cybersecurity Headlines

A long-running campaign phishing for credentials through scareware recently switched to targeting macOS users.

Google has confirmed reports that it’s buying cloud security giant Wiz and says it’s prepared to pay $32 billion in cash.

A year-old vulnerability in a third-party ChatGPT tool is being exploited against financial entities and US government organizations.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

This webinar will guide you in aligning your security testing strategy with the right tools, helping you move beyond identifying weaknesses to effectively validating your overall security posture.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

This event delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Learn More

Supply Chain Security Summit
Join us as we explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects. (March 19, 2025)

Learn More

Vulnerabilities

Cybercrime

Jailbroken iPhones - a Risk in the EnterpriseLast week’s ruling by the Library of Congress's Copyright Office giving a legal green light to iPhone and iPad users who want to download non-Apple-approved apps may make corporate security managers nervous if these Apple products are part of their mobile device portfolio – but a smartphone security company has come up with a counter-measure that will at least bring the risk level down to what it was before the ruling.

Solace Systems and Layer 7 Technologies Team Up on Scalable Messaging for SOA and Cloud EnvironmentsSolace Systems and Layer 7 Technologies have announced a joint venture in which the companies will integrate their technologies to offer scalable and secure SOA and cloud based solutions to their customers.

Information security technology vendor Perimeter E-Security has decided to expand its R&D initiatives by opening a new innovation center in Boston, MA. The company plans to expand the new research group for the next two years. Perimeter E-Security offers information security and compliance products to enterprise users including secure messaging services, firewall services and anti-virus and spam detection services.

Mumba Botnet Infects over 55,000 Computers around the worldAVG Technologies issued a report this week that identified a global network of 55,000 malware-infected computers infected by the Mumba botnet.AVG researchers discovered that the Mumba botnet, named after attributes indentified on the server, has stolen more than 60GB of data from users including credentials from social networking Web sites, banking account details, credit card numbers and emails.

MobileIron, a provider of multi-OS smartphone management solutions, today announced a $16 million Series C financing round. Just under a year ago the company raised $11 million in a Series B funding round.The new capital will be used to support business expansion and investment in innovation.Foundation Capital joined existing investors Norwest Venture Partners, Sequoia Capital, and Storm Ventures. The investment was led by Paul Holland, general partner with Foundation Capital.

Biometric Authentication for iPhone AppsPerSay, a provider of Voice Biometric solutions, today announced the availability of its VocalPassword functionality for iPhone, iPad, and iPod Touch applications. The new capability can replace existing login processes and use technology that relies on the biometric power of voice to verify identity.

Mobile Device Management Security a Top ConcernA recent survey conducted by security firm McAfee has revealed that around 76 percent organizations are planning to implement at least one key mobility initiative to improve their operations within the next 6 to 12 months.

"Mariposa botnet" - Butterfly botnet kit Author Arrested“Iserdo,” the confirmed author of the Butterfly botnet kit, was arrested recently in Maribor, Slovenia, by Slovenian authorities working with the FBI. The 23-year-old master hacker known only by his Internet handle is allegedly the mastermind behind the code used to build the Mariposa botnet, which has compromised millions of systems worldwide. He is currently free on bail.

Microsoft this week announced an agreement to collaborate with Adobe systems and facilitate advanced information sharing on vulnerabilities via its Microsoft Active Protections Program (MAPP), which Adobe will join. MAPP is a collaborative effort involving 65 global members that facilitates the sharing of product vulnerabilities with security software providers. Adobe will join the program in the fall of this year.

The presentation "Jackpotting Automated Teller Machines" was originally on the schedule at Black Hat USA 2009 but the talk was pulled at the last minute. This year it was on! Videos of Barnaby Jack demonstrating both local and remote attacks and a multi-platform ATM rootkit.Barnaby Jack Hacks ATMs Remotely At Black Hat

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Google has integrated OSV-SCALIBR features into OSV-Scanner, its free vulnerability scanner for open source developers.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.