Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

With unapproved AI tools entrenched in daily workflows, experts say it’s time to shift from monitoring to managing Shadow AI use across the enterprise.

Noteworthy stories that might have slipped under the radar: 4chan hacked, auto-reboot security feature coming to Android, Iranian administrator of Nemesis charged in US.

Data protection firm Cy4Data Labs has raised $10 million in a Series A funding round led by Pelion Venture Partners.

Legends International says the personal information of employees and customers was compromised as a result of a cyberattack.

Ahold Delhaize has confirmed that data was stolen from its systems in November 2024 after a ransomware group claimed the attack.

A Windows NTLM vulnerability patched in March has been exploited in attacks targeting government and private institutions.

Minh Phuong Ngoc Vong pleaded guilty to defrauding US companies of roughly $1 million in a fake IT worker scheme.

While the Security Posture Management buzz is real, its long-term viability depends on whether it can deliver measurable outcomes without adding more complexity.

Atlassian and Cisco have released patches for multiple high-severity vulnerabilities, including remote code execution bugs.

Servers exposed to complete takeover due to CVE-2025-32433, an unauthenticated remote code execution flaw in Erlang/OTP SSH.

Our collective voices and one community will provide the intelligence we need to safeguard our businesses in today’s modern digital environment.

People on the Move

After the passing of Amit Yoran, Tenable has appointed Steve Vintz and Mark Thurmond as co-CEOs.

Former Wiz executive Trish Cagliostro has joined Orchid Security as Chief Revenue Officer.

Transcend has named former UnitedHealth Group CISO Aimee Cardwell as CISO in Residence.

Ketan Tailor has joined Barracuda Networks as Chief Customer Officer.

Axonius has appointed former Disney CISO Ryan Knisley as its Chief Product Strategist.

More People On The Move
Privacy of Social Media and Internet Apps Privacy of Social Media and Internet Apps

With unapproved AI tools entrenched in daily workflows, experts say it’s time to shift from monitoring to managing Shadow AI use across the enterprise.

Windows vulnerability exploited Windows vulnerability exploited

A Windows NTLM vulnerability patched in March has been exploited in attacks targeting government and private institutions.

SonicWall vulnerability exploited SonicWall vulnerability exploited

A SonicWall SMA 100 series vulnerability patched in 2021, which went unnoticed at the time of patching, is being exploited in the wild.

Top Cybersecurity Headlines

The vulnerabilities are described as code execution and mitigation bypass issues that affect Apple’s iOS, iPadOS and macOS platforms.

The US government’s cybersecurity agency CISA has “executed the option period on the contract” to keep the vulnerability catalog operational.

China accuses three alleged U.S. NSA operatives of cyberattacks targeting critical infrastructure and the Asian Games in Harbin.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

This webinar will guide you in aligning your security testing strategy with the right tools, helping you move beyond identifying weaknesses to effectively validating your overall security posture.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

This event delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Learn More

Supply Chain Security Summit
Join us as we explore the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects. (March 19, 2025)

Learn More

Vulnerabilities

Cybercrime

Mobile Device Management Security a Top ConcernA recent survey conducted by security firm McAfee has revealed that around 76 percent organizations are planning to implement at least one key mobility initiative to improve their operations within the next 6 to 12 months.

"Mariposa botnet" - Butterfly botnet kit Author Arrested“Iserdo,” the confirmed author of the Butterfly botnet kit, was arrested recently in Maribor, Slovenia, by Slovenian authorities working with the FBI. The 23-year-old master hacker known only by his Internet handle is allegedly the mastermind behind the code used to build the Mariposa botnet, which has compromised millions of systems worldwide. He is currently free on bail.

Microsoft this week announced an agreement to collaborate with Adobe systems and facilitate advanced information sharing on vulnerabilities via its Microsoft Active Protections Program (MAPP), which Adobe will join. MAPP is a collaborative effort involving 65 global members that facilitates the sharing of product vulnerabilities with security software providers. Adobe will join the program in the fall of this year.

The presentation "Jackpotting Automated Teller Machines" was originally on the schedule at Black Hat USA 2009 but the talk was pulled at the last minute. This year it was on! Videos of Barnaby Jack demonstrating both local and remote attacks and a multi-platform ATM rootkit.Barnaby Jack Hacks ATMs Remotely At Black Hat

The presentation "Jackpotting Automated Teller Machines" was originally on the schedule at Black Hat USA 2009 but the talk was pulled at the last minute. This year it was on! and... it just happened today. We are in the process of uploading VIDEOS of the ATM hacking demonstration but the pipes are a little slow from Vegas today. In the meantime, here are a few photos. Check back later tonight and we'll have the actual videos of Barnaby Jack demonstrating...

CA Technologies (NASDAQ:CA) today announced that its identity and access management (IAM) technology now supports the Google Apps™ suite, which includes the familiar and widely-used Gmail and Google Docs applications. This means that companies can now use the same identity/access management system for both internal and external (Google) applications.

A shocking 87 percent of the victims in a study of data breaches jointly conducted by Verizon and the U.S. Secret Service had evidence of the breach in their log files, yet missed it. According to the 2010 Verizon Data Breach Investigations Report, 60 percent of breaches were discovered by external parties, and then only after a considerable amount of time.Most breaches were considered avoidable if security basics had been followed Only 4 percent of breaches assessed required difficult and...

Solera Networks, a provider of network forensics and network monitoring solutions, announced today that it has closed $15 million in Series C financing. Trident Capital lead the round as a new investor and was also joined by Allegis Capital and Canopy Ventures who were previous investors.

Cisco Global Threat Report - 2Q10For the first time since tracking began in 2007, the number of unique web-based malware hosts and malware URLs didn’t increase, according to Cisco’s Quarterly Global Threat Report just issued for the second quarter of 2010.

App Genome Project Enables Rapid Identification of Bad Applications San Francisco based Smartphone security company, Lookout, today unveiled plans for an initiative to map and study mobile applications in order to identify security threats and provide insight into how applications are tapping into personal data and accessing other phone resources.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Lemonade says the incident is not material and that its operations were not compromised, nor was its customer data targeted.

Cloud Security

Cloud Security

The greatest security policies in the world are useless if enterprises don’t have a reasonable, consistent, and reliable way to implement them.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.