Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Latest Cybersecurity News

Noteworthy stories that might have slipped under the radar: Cloudflare outage not caused by cyberattack, Dutch police identified 126 users of Cracked.io, the Victoria’s Secret cyberattack has cost $10 million. 

Threat actors have abused the TeamFiltration pentesting framework to target over 80,000 Entra ID user accounts.

Industry professionals comment on the Trump administration’s new executive order on cybersecurity. 

CISA warns that vulnerable SimpleHelp RMM instances have been exploited against a utility billing software provider’s customers.

Multiple legitimate, unusual tools were used in a Fog ransomware attack, including one employed by Chinese hacking group APT41.

Mitel has announced patches for a MiCollab path traversal vulnerability that can be exploited remotely without authentication.

Trend Micro patches critical-severity Apex Central and Endpoint Encryption PolicyServer flaws leading to remote code execution.

ZeroRISC has raised $10 million in seed funding for production-grade open source silicon security, built on OpenTitan designs.

Citizen Lab publishes forensic proof that spyware maker Paragon can compromise up-to-date iPhones. Journalists in Europe among victims.

AI-generated voice deepfakes have crossed the uncanny valley, fueling a surge in fraud that outpaces traditional security measures. Detection technology is racing to keep up.

Hirundo tackles AI hallucinations and bias by making trained models “forget” poisoned, malicious, and confidential data.

People on the Move

Cloud security startup Upwind has appointed Rinki Sethi as Chief Security Officer.

SAP security firm SecurityBridge announced the appointment of Roman Schubiger as the company’s new CRO.

Cybersecurity training and simulations provider SimSpace has appointed Peter Lee as Chief Executive Officer.

Orchid Security has appointed a new Chief Product Officer and three advisors.

Kaseya has appointed Rania Succar as Chief Executive Officer.

More People On The Move
Trump Cybersecurity Executive Order Trump Cybersecurity Executive Order

Industry professionals comment on the Trump administration’s new executive order on cybersecurity. 

Mitel MiCollab vulnerabilities Mitel MiCollab vulnerabilities

Mitel has announced patches for a MiCollab path traversal vulnerability that can be exploited remotely without authentication.

Deepfake voice Deepfake voice

AI-generated voice deepfakes have crossed the uncanny valley, fueling a surge in fraud that outpaces traditional security measures. Detection technology is racing to keep up.

Top Cybersecurity Headlines

The new attack technique uses smartwatches to capture ultrasonic covert communication in air-gapped environments and exfiltrate data.

Interpol has announced a crackdown on infostealer malware in Asia as part of an effort called Operation Secure.

Series E funding round brings Cyera’s total funding to over $1.3 billion and values the data security firm at $6 billion.

SecurityWeek Industry Experts

More Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Register

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

Upcoming Cybersecurity Events

The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders. [August 19-20, 2025 | Ritz-Carlton, Half Moon Bay]

Learn More

SecurityWeek’s CISO Forum Summer Summit & Golf Classic will take place August 19-20 at the Ritz-Carlton, Half Moon Bay, CA. (www.cisoforum.com)

Learn More

The Threat Detection & Incident Response Summit delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. [May 21, 2025 – Virtual]

Learn More

SecurityWeek’s Cloud and Data Security Summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. [July 16, 2025 – Virtual]

Learn More

Vulnerabilities

Cybercrime

Although more than 80 percent of the respondents to a new survey conducted by the Ponemon Institute expressed concern about the security of social media, more than half of these same individuals admitted they do not take any steps to actively protect themselves.

IT security risk and compliance management solutions provider, Qualys, today added a new feature to its QualysGuard Vulnerability Management solution to help customers identify and implement patches to eliminate vulnerabilities in their IT environments.

A survey of IT security professionals, those who should be security conscious, has revealed that over half of respondents (52%), admit to carrying company data on a USB stick with no encryption. The survey also revealed that 11% of the security savvy audience ‘protected’ their devices with passwords only, an insufficient defense that is easily breached.

As cybercrime continues to grow and become more complex, businesses must race to implement tools, technologies and strategies to protect their organizations.Frost & Sullivan cites Cybercrime as the primary driving factor in the growth of the North American Managed Security Service Provider (MSSP) Market. The firm estimates that managed security service providers generated revenues of $1.20 billion in 2009 and estimates this to reach $3.90 billion in 2016.

PandaLabs, the anti-malware laboratory of Panda Security, has reported a new proliferation of scams that highjack the Facebook "Like" option. The attacks use bogus messages that look like they’re from friends, with topics related to the popular game Farmville, the film Sex and the City 2 or simply the keyword “sex.” Unwary Facebook users who click on the links in these messages are taken to a Web page containing photos and videos of the relevant topic.

It was a shocking discovery that had security experts around the world concerned. In 2008, security researcher Dan Kaminsky exposed a serious flaw in the Domain Name System (DNS) that allowed cyber criminals to easily impersonate websites, intercept email, or steal passwords to hack into corporate networks via DNS cache poisoning attacks.

AVG Technologies, developers of some of the world’s most popular and free anti-virus software for Windows, today announced an offering for Mac lovers. AVG LinkScanner for Mac is a free AVG product designed for the Mac OS X Leopard and Snow Leopard operating systems. It supports the Safari 3.x, Safari 4.x and Safari 5.x internet browsers as well as Mozilla Firefox 3.x and higher.

AT&T acknowledged on Wednesday that a security hole in its Web site had exposed the email addresses of some iPad owners.A group of computer experts that calls itself “Goatse Security” claimed to have exploited the AT&T Web site using part of an HTTP request, triggering a script which would return the associated email address using an AJAX-style response within the Web application.

Boston based Nasuni, a company that helps customers secure data stored with cloud storage providers such as Amazon AWS and RackSpace Cloud, this morning shared some ways to address data security in cloud based storage environments.

Companies are often faced with tough decisions regarding policies on social networking use in the workplace. For many companies, social networking is becoming an essential component of business. From online marketing to supporting clients and interacting with prospective customers, social networking is a valuable tool for businesses small and large. To the contrary, social networking can be a distraction and time wasting activity for those who do not use it for business purposes.

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

Security researchers uncover critical flaws and widespread misconfigurations in Salesforce’s industry-specific CRM solutions.

Cloud Security

Artificial Intelligence

Maze and its investors are betting on finding profits in software that uses AI-powered agents to automate critical parts of the process.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.