Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

VMware patches flaws that expose users to data leakage, command execution and denial-of-service attacks. No temporary workarounds available. 

The Likely Exploited Vulnerabilities (LEV) equations can help augment KEV- and EPSS-based remediation prioritization. 

SecurityWeek’s 2025 Threat Detection & Incident Response (TDIR) Summit takes place as a virtual summit on Wednesday, May 21st.

AI-native security assurance firm TrustCloud has raised $15 million in a strategic funding round led by ServiceNow Ventures.

Threat protection and intelligence firm CloudSEK raises $19 million in funding from new and existing investors.

A vulnerability in O2’s implementation of the IMS standard resulted in user location data being exposed in network responses.

New CISA Deputy Director Madhu Gottumukkala has joined the agency from South Dakota’s Bureau of Information and Technology.

San Francisco incident response coordination startup banks $15 million in a Series A funding round led by Ballistic Ventures.

Procolored’s public website served dozens of software downloads containing information stealer malware and a backdoor.

The UK’s Legal Aid Agency was targeted in a cyberattack in April and it recently determined that hackers have stolen sensitive data.

Serviceaide exposed a database containing personal and medical information belonging to Catholic Health patients.

People on the Move

Cloud and cybersecurity MSP Ekco has appointed Ben Savage as UK CEO.

Shane Barney has been appointed CISO of password management and PAM solutions provider Keeper Security.

Edge Delta has appointed Joan Pepin as its Chief Information Security Officer.

Vats Srivatsan has been appointed interim CEO of WatchGuard after Prakash Panjwani stepped down.

Network security policy management firm FireMon has appointed Alex Bender as Chief Marketing Officer.

More People On The Move
Pwn2Own Berlin 2025 results Pwn2Own Berlin 2025 results

Pwn2Own participants demonstrated exploits against VMs, AI, browsers, servers, containers, and operating systems.

NATO Locked Shields NATO Locked Shields

The 15th edition of NATO’s Locked Shields cyber defense exercise brought together 4,000 experts from 41 countries.

Nucor Cyberattack Nucor Cyberattack

American steel giant Nucor on Wednesday disclosed a cybersecurity incident that bears the hallmarks of a ransomware attack.

Top Cybersecurity Headlines

The China-linked hacking group Earth Ammit has launched multi-wave attacks in Taiwan and South Korea to disrupt the drone sector.

Google bundles multiple safeguards under a single Android toggle to protect high-risk users from advanced mobile malware implants.

Ivanti has released patches for two EPMM vulnerabilities that have been chained in the wild for remote code execution.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Join this webinar for a fascinating discussion to understand why data in itself is not enough to make informed decisions for prioritization.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

Boston based Nasuni, a company that helps customers secure data stored with cloud storage providers such as Amazon AWS and RackSpace Cloud, this morning shared some ways to address data security in cloud based storage environments.

Companies are often faced with tough decisions regarding policies on social networking use in the workplace. For many companies, social networking is becoming an essential component of business. From online marketing to supporting clients and interacting with prospective customers, social networking is a valuable tool for businesses small and large. To the contrary, social networking can be a distraction and time wasting activity for those who do not use it for business purposes.

With the excitement surrounding Apple’s iPhone 4 at its World Wide Developer Conference (WWDC) yesterday, Apple decided not talk about the latest version of its Web browser during the Keynote, instead making the announcement and releasing the product later in the day.

The need for organizations to design and adhere to strong security policies in order to maintain the integrity of their systems is well understood. As long as all you have to worry about is your own internal infrastructure, creating the right policies and sticking to them is a great way to help reduce risk on your network. But there are some circumstances where it is necessary to outsource a mission-critical piece of infrastructure to a third party.

Internet infrastructure services provider, Neustar, Inc. (NYSE: NSR) announced today that its registry team has completed deployment of DNSSEC in the .US zone and is ready to accept Delegation Signer (DS) records. The .BIZ zone will follow quickly, accepting records as early as July 15, 2010, making it the second gTLD to be fully DNSSEC-enabled.

Companies around the world are increasingly using social media for business marketing, support, and collaboration but also exposing themselves to risks such as non-compliance, data loss and legal issues.

Top 10 Malware Threats - May, 2010Security software company, Sunbelt Software, in its monthly malware threat report, today announced the top 10 most prevalent malware threats detected in May 2010.

Log management and security company, LogLogic, today released a preview of its upcoming log management virtual appliances. The LogLogic Log Management Virtual Appliance is a virtual log management solution, offering enterprise-grade log data collection, search and storage capabilities for companies seeking to improve business operations, enhance security and meet compliance requirements. The virtual appliances operate on VMWare’s ESX virtual servers as well as on devices running VMWare WorkStation, and VMWare Player.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Code quality and security firm CodeAnt has secured $2 million in seed funding and it has been valued at $20 million.

Cloud Security

Cloud Security

VMware patches flaws that expose users to data leakage, command execution and denial-of-service attacks. No temporary workarounds available. 

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.