Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Noteworthy stories that might have slipped under the radar: Switzerland requires disclosure of critical infrastructure attacks, ESP32 chips don’t contain a backdoor, MassJacker cryptojacking malware.

The ClickFix technique has been employed by cybercrime and APT groups for information stealer and other malware deployment.

Russian-Israeli LockBit ransomware developer Rostislav Panev has been extradited from Israel to the United States.

Measure the different level of risk inherent to all gen-AI foundational models and use that to fine-tune the operation of in-house AI deployments.

Your guide on how to get through the conference with your sanity, energy, and key performance indicators (KPIs) intact.

Two Microsoft researchers have devised a new jailbreak method that bypasses the safety mechanisms of most AI systems.

The newly discovered SuperBlack ransomware has been exploiting two vulnerabilities in Fortinet firewalls.

A recently disclosed Edimax zero-day vulnerability has been exploited in the wild by Mirai botnets for nearly a year.

Meta’s Facebook security team warns of live exploitation of a zero-day vulnerability in the open-source FreeType library. 

Cisco has released patches for 10 vulnerabilities in IOS XR, including five denial-of-service (DoS) bugs.

Threat actors are likely targeting Grafana path traversal bugs for reconnaissance in a SSRF exploitation campaign targeting popular platforms.

People on the Move

Cybersecurity firm Absolute Security announced Harold Rivas as its new CISO.

Simon Forster has been named the new General Manager of DNS security firm Quad9.

Cybersecurity training company Immersive has named Mark Schmitz as its new CEO.

ICS/OT security firm Claroty has appointed Amir Preminger as Chief Technology Officer.

Sasha Pailet Koff has been named Managing Director of the Cyber Readiness Institute.

More People On The Move
Ransomware Ransomware

The newly discovered SuperBlack ransomware has been exploiting two vulnerabilities in Fortinet firewalls.

Medusa ransomware Medusa ransomware

CISA, FBI, and MS-ISAC warn of Medusa ransomware attacks targeting critical infrastructure organizations.

China Volt Typhoon electric grid China Volt Typhoon electric grid

Dragos case study reveals that Volt Typhoon hacked the US electric grid and stole information on OT systems.

Top Cybersecurity Headlines

Microsoft on Tuesday patched a zero-day vulnerability in the Windows Win32 kernel that has been exploited since March 2023.

Redmond ships major security updates with warnings that a half-dozen Windows vulnerabilities have already been exploited in the wild.

Several healthcare organizations in different US states have disclosed data breaches affecting 100,000-200,000 individuals. 

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this in-depth briefing on how to protect executives and the enterprises they lead from the growing convergence of digital, narrative, and physical attacks.

Register

This webinar will guide you in aligning your security testing strategy with the right tools, helping you move beyond identifying weaknesses to effectively validating your overall security posture.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [June 2025, Stay Tuned]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.(February 26, 2025)

Learn More

Supply Chain Security Summit
Join us as we explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects. (March 19, 2025)

Learn More

Vulnerabilities

Cybercrime

World Cup fans continue to be prime targets for cybercriminals this summer with new mobile viruses targeting smart-phone users looking for the latest news and content surrounding the international soccer tournament being held in South Africa this year.

The number of spam messages approached 6 billion for the month of January and never dipped below 3.5 billion during the past six months, according to SaaS e-mail and web security provider AppRiver’s mid-year Threat and Spamscape report.

The third installment of the "Twilight" franchise, “Eclipse,” which premiered this week, is breaking records for a midnight opening and fans are searching in the masses for any details about the film they can find online. Cyber criminals know this and have already "poisoned" common search results hoping to gain access to people's computers and infect them with malware.

Core Security, maker of penetration testers used by “red teams” to identify security vulnerabilities, today announced beta availability of a fully automated testing solution with the ability to continuously test and measure the overall security standing of an enterprise.

(ISC)2, the large not-for-profit information security professionals organization, today announced that Devon Bryan, CISSP, deputy associate chief information officer for cybersecurity for the U.S. Internal Revenue Service (IRS), has been selected as the new co-chair of the (ISC)2 U.S. Government Advisory Board (GAB) for Cyber Security.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

The financing was provided by S Capital and investor Mike Moritz, S32, Glilot Capital Partners, and several angel investors.

Cloud Security

Artificial Intelligence

Google Cloud’s AI Protection helps discover AI inventory, secure AI assets, and manage threats with detect, investigate, and respond capabilities.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.