Security News – 2025-09-01
Mon Sep 01 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
No relevant security news found from the specified time periods matching the keywords.
Browse the full archive of security news and updates.
Back to LatestMon Sep 01 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
No relevant security news found from the specified time periods matching the keywords.
Sun Aug 31 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
No relevant security news found from the specified time periods matching the keywords.
Sat Aug 30 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Found 19 relevant security news items from the last 3 days (daily news) and 14 days (research blogs) across 6 sources (max 10 entries per source).
Cybersecurity news and insights
Cybersecurity researchers have called attention to a cyber attack in which unknown threat actors deployed an open-source endpoint monitoring and digital forensic tool called Velociraptor, illustrating ongoing abuse of legitimate software for malicious purposes. “In this incident, the threat actor used the tool to download and execute Visual Studio Code with the likely intention of creating a
WhatsApp has addressed a security vulnerability in its messaging apps for Apple iOS and macOS that it said may have been exploited in the wild in conjunction with a recently disclosed Apple flaw in targeted zero-day attacks. The vulnerability, CVE-2025-55177 (CVSS score: 8.0), relates to a case of insufficient authorization of linked device synchronization messages. Internal researchers on the
Three new security vulnerabilities have been disclosed in the Sitecore Experience Platform that could be exploited to achieve information disclosure and remote code execution. The flaws, per watchTowr Labs, are listed below -
CVE-2025-53693 - HTML cache poisoning through unsafe reflections CVE-2025-53691 - Remote code execution (RCE) through insecure deserialization CVE-2025-53694 -
Picture this: Your team rolls out some new code, thinking everything’s fine. But hidden in there is a tiny flaw that explodes into a huge problem once it hits the cloud. Next thing you know, hackers are in, and your company is dealing with a mess that costs millions. Scary, right? In 2025, the average data breach hits businesses with a whopping $4.44 million bill globally. And guess what? A big
Latest cybersecurity news
Noteworthy stories that might have slipped under the radar: communications of dozens of Iranian ships disrupted, only apps from verified developers will run on Android devices, and AI used across multiple phases of malicious attacks.
The post In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks appeared first on SecurityWeek.
Cybersecurity news and insights
An abandoned update server associated with input method editor (IME) software Sogou Zhuyin was leveraged by threat actors as part of an espionage campaign to deliver several malware families, including C6DOOR and GTELAM, in attacks primarily targeting users across Eastern Asia. “Attackers employed sophisticated infection chains, such as hijacked software updates and fake cloud storage or login
Latest cybersecurity news
Google says the same OAuth token compromise that enabled Salesforce data theft also let hackers access a small number of Workspace accounts via the Salesloft Drift integration.
The post Google Confirms Workspace Accounts Also Hit in Salesforce–Salesloft Drift Data Theft Campaign appeared first on SecurityWeek.
The credit reporting firm did not name the third-party application involved in the incident, only noting that it was used for its US consumer support operations.
The post TransUnion Data Breach Impacts 4.4 Million appeared first on SecurityWeek.
State officials confirm ransomware forced office closures, disrupted services, and led to data theft, as Nevada works with CISA and law enforcement to restore critical systems.
The post Nevada Confirms Ransomware Attack Behind Statewide Service Disruptions appeared first on SecurityWeek.
Storm-0501 has been leveraging cloud-native capabilities for data exfiltration and deletion, without deploying file-encrypting malware.
The post Ransomware Group Exploits Hybrid Cloud Gaps, Gains Full Azure Control in Enterprise Attacks appeared first on SecurityWeek.
Security news and analysis by Bruce Schneier
I just heard about this:
There’s a travel scam warning going around the internet right now: You should keep your baggage tags on your bags until you get home, then shred them, because scammers are using luggage tags to file fraudulent claims for missing baggage with the airline.
First, the scam is possible. I had a bag destroyed by baggage handlers on a recent flight, and all the information I needed to file a claim was on my luggage tag. I have no idea if I will successfully get any money from the airline, or what form it will be in, or how it will be tied to my name, but at least the first step is possible...
Cybersecurity news and insights
Generative AI platforms like ChatGPT, Gemini, Copilot, and Claude are increasingly common in organizations. While these solutions improve efficiency across tasks, they also present new data leak prevention for generative AI challenges. Sensitive information may be shared through chat prompts, files uploaded for AI-driven summarization, or browser plugins that bypass familiar security controls.
Click Studios, the developer of enterprise-focused password management solution Passwordstate, said it has released security updates to address an authentication bypass vulnerability in its software. The high-severity issue, which is yet to be assigned a CVE identifier, has been addressed in Passwordstate 9.9 (Build 9972), released August 28, 2025. The Australian company said it fixed a “
The Sangoma FreePBX Security Team has issued an advisory warning about an actively exploited FreePBX zero-day vulnerability that impacts systems with an administrator control panel (ACP) exposed to the public internet. FreePBX is an open-source private branch exchange (PBX) platform widely used by businesses, call centers, and service providers to manage voice communications. It’s built on top
Authorities from the Netherlands and the United States have announced the dismantling of an illicit marketplace called VerifTools that peddled fraudulent identity documents to cybercriminals across the world. To that end, two marketplace domains (verif[.]tools and veriftools[.]net) and one blog have been taken down, redirecting site visitors to a splash page stating the action was undertaken by
Security news and analysis by Bruce Schneier
The US Director of National Intelligence is reporting that the UK government is dropping its backdoor mandate against the Apple iPhone. For now, at least, assuming that Tulsi Gabbard is reporting this accurately.
Security research and insights from Trail of Bits
Our business operations intern at Trail of Bits built two AI-powered tools that became permanent company resources—a podcast workflow that saves 1,250 hours annually and a Slack exporter that enables efficient knowledge retrieval across the organization.
In this blog post, we’ll detail how attackers can exploit image scaling on Gemini CLI, Vertex AI Studio, Gemini’s web and API interfaces, Google Assistant, Genspark, and other production AI systems. We’ll also explain how to mitigate and defend against these attacks, and we’ll introduce Anamorpher, our open-source tool that lets you explore and generate these crafted images.
This post traces the decade-long evolution of Ruby Marshal deserialization exploits, demonstrating how security researchers have repeatedly bypassed patches and why fundamental changes to the Ruby ecosystem are needed rather than continued patch-and-hope approaches.
Fri Aug 29 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
China-linked APT ‘Salt Typhoon’ exploited known router flaws to maintain persistent access across telecom, government, and military networks, giving Beijing’s intelligence services global surveillance reach.
The post China’s Salt Typhoon Hacked Critical Infrastructure Globally for Years appeared first on SecurityWeek.
CrowdStrike says the acquisition will bring valuable technology to enhance its Falcon Next-Gen SIEM.
The post CrowdStrike to Acquire Onum to Fuel Falcon Next-Gen SIEM With Real-Time Telemetry appeared first on SecurityWeek.
Join this live discussion to learn how organizations can strengthen ransomware defenses while staying ahead of tightening compliance requirements.
The post Webinar Today: Ransomware Defense That Meets Evolving Compliance Mandates appeared first on SecurityWeek.
With more than 4 million weekly downloads, the Nx build platform became the first known supply chain breach where hackers weaponized AI assistants for data theft.
The post Hackers Target Popular Nx Build System in First AI-Weaponized Supply Chain Attack appeared first on SecurityWeek.
AI-powered phishing attacks leverage ConnectWise ScreenConnect for remote access, underscoring their sophistication.
The post Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect appeared first on SecurityWeek.
Thu Aug 28 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
AI-powered phishing attacks leverage ConnectWise ScreenConnect for remote access, underscoring their sophistication.
The post Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect appeared first on SecurityWeek.
Google says the hackers systematically exported corporate data, focusing on secrets such as AWS and Snowflake keys.
The post Hundreds of Salesforce Customers Hit by Widespread Data Theft Campaign appeared first on SecurityWeek.
Google researchers say China-linked UNC6384 combined social engineering, signed malware, and adversary-in-the-middle attacks to evade detection.
The post China-Linked Hackers Hijack Web Traffic to Deliver Backdoor appeared first on SecurityWeek.
State websites and phone lines were taken offline, but officials say emergency services and personal data remain unaffected.
The post Nevada State Offices Closed Following Disruptive Cyberattack appeared first on SecurityWeek.
Competition among malware-as-a-service developers has transformed infostealers into refined, accessible tools for cybercriminals worldwide.
The post Infostealers: The Silent Smash-and-Grab Driving Modern Cybercrime appeared first on SecurityWeek.
Wed Aug 27 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Building secure AI agent systems requires a disciplined engineering approach focused on deliberate architecture and human oversight.
The post Beyond the Prompt: Building Trustworthy Agent Systems appeared first on SecurityWeek.
The personal information of many individuals was stolen from Healthcare Services Group’s computer systems in 2024.
The post Healthcare Services Group Data Breach Impacts 624,000 appeared first on SecurityWeek.
A critical vulnerability in Docker Desktop allows attackers to modify the filesystem of Windows hosts to become administrators.
The post Docker Desktop Vulnerability Leads to Host Compromise appeared first on SecurityWeek.
Researchers show how popular AI systems can be tricked into processing malicious instructions by hiding them in images.
The post AI Systems Vulnerable to Prompt Injection via Image Scaling Attack appeared first on SecurityWeek.
Auchan confirms that the personal information of hundreds of thousands of customers was stolen in a data breach.
The post Hundreds of Thousands Affected by Auchan Data Breach appeared first on SecurityWeek.
Tue Aug 26 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Researchers unveil OneFlip, a Rowhammer-based attack that flips a single bit in neural network weights to stealthily backdoor AI systems without degrading performance.
The post OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail appeared first on SecurityWeek.
Pakistani state-sponsored hacking group APT36 is targeting Linux systems in a fresh campaign aimed at Indian government entities.
The post Pakistani Hackers Back at Targeting Indian Government Entities appeared first on SecurityWeek.
Aspire Rural Health System was targeted last year by the BianLian ransomware group, which claimed to have stolen sensitive data.
The post Aspire Rural Health System Data Breach Impacts Nearly 140,000 appeared first on SecurityWeek.
Data I/O has disclosed a ransomware attack that disrupted the company’s operations, including communications, shipping and production.
The post Chip Programming Firm Data I/O Hit by Ransomware appeared first on SecurityWeek.
The Anatsa Android banking trojan has expanded its target list to new countries and more cryptocurrency applications.
The post Anatsa Android Banking Trojan Now Targeting 830 Financial Apps appeared first on SecurityWeek.
Mon Aug 25 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Dubbed Operation Serengeti 2.0, the operation took place between June and August.
The post Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects appeared first on SecurityWeek.
Noteworthy stories that might have slipped under the radar: cryptojacker sentenced to prison, ECC.fail Rowhammer attack, and Microsoft limits China’s access to MAPP.
The post In Other News: McDonald’s Hack, 1,200 Arrested in Africa, DaVita Breach Grows to 2.7M appeared first on SecurityWeek.
Silk Typhoon was seen exploiting n-day and zero-day vulnerabilities for initial access to victim systems.
The post Chinese Silk Typhoon Hackers Targeting Multiple Industries in North America appeared first on SecurityWeek.
Davis Lu was sentenced to four years in prison for installing malicious code on employer’s systems and for deleting encrypted data.
The post Developer Who Hacked Former Employer’s Systems Sentenced to Prison appeared first on SecurityWeek.
CPAP Medical Supplies and Services has disclosed a data breach resulting from an intrusion that occurred in December 2024.
The post CPAP Medical Data Breach Impacts 90,000 People appeared first on SecurityWeek.
Sun Aug 24 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Dubbed Operation Serengeti 2.0, the operation took place between June and August.
The post Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects appeared first on SecurityWeek.
Noteworthy stories that might have slipped under the radar: cryptojacker sentenced to prison, ECC.fail Rowhammer attack, and Microsoft limits China’s access to MAPP.
The post In Other News: McDonald’s Hack, 1,200 Arrested in Africa, DaVita Breach Grows to 2.7M appeared first on SecurityWeek.
Silk Typhoon was seen exploiting n-day and zero-day vulnerabilities for initial access to victim systems.
The post Chinese Silk Typhoon Hackers Targeting Multiple Industries in North America appeared first on SecurityWeek.
Davis Lu was sentenced to four years in prison for installing malicious code on employer’s systems and for deleting encrypted data.
The post Developer Who Hacked Former Employer’s Systems Sentenced to Prison appeared first on SecurityWeek.
CPAP Medical Supplies and Services has disclosed a data breach resulting from an intrusion that occurred in December 2024.
The post CPAP Medical Data Breach Impacts 90,000 People appeared first on SecurityWeek.
Sat Aug 23 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Dubbed Operation Serengeti 2.0, the operation took place between June and August.
The post Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects appeared first on SecurityWeek.
Noteworthy stories that might have slipped under the radar: cryptojacker sentenced to prison, ECC.fail Rowhammer attack, and Microsoft limits China’s access to MAPP.
The post In Other News: McDonald’s Hack, 1,200 Arrested in Africa, DaVita Breach Grows to 2.7M appeared first on SecurityWeek.
Silk Typhoon was seen exploiting n-day and zero-day vulnerabilities for initial access to victim systems.
The post Chinese Silk Typhoon Hackers Targeting Multiple Industries in North America appeared first on SecurityWeek.
Davis Lu was sentenced to four years in prison for installing malicious code on employer’s systems and for deleting encrypted data.
The post Developer Who Hacked Former Employer’s Systems Sentenced to Prison appeared first on SecurityWeek.
CPAP Medical Supplies and Services has disclosed a data breach resulting from an intrusion that occurred in December 2024.
The post CPAP Medical Data Breach Impacts 90,000 People appeared first on SecurityWeek.
Fri Aug 22 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Colt Technology Services is working on restoring systems disrupted by a ransomware attack that involved data theft.
The post Telecom Firm Colt Confirms Data Breach as Ransomware Group Auctions Files appeared first on SecurityWeek.
Noah Urban was sentenced to 10 years in prison for his role in the notorious cybercriminal operation known as Scattered Spider.
The post Scattered Spider Hacker Sentenced to Prison appeared first on SecurityWeek.
A researcher has tested nearly a dozen password managers and found that they were all vulnerable to clickjacking attacks.
The post Password Managers Vulnerable to Data Theft via Clickjacking appeared first on SecurityWeek.
Russian state-sponsored hackers tracked as Static Tundra continue to target Cisco devices affected by CVE-2018-0171.
The post Russian APT Exploiting 7-Year-Old Cisco Vulnerability: FBI appeared first on SecurityWeek.
Orange Belgium says hackers accessed data pertaining to 850,000 customer accounts during a July cyberattack.
The post Orange Belgium Data Breach Impacts 850,000 Customers appeared first on SecurityWeek.
Thu Aug 21 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Instead of GPT-5 Pro, your query could be quietly redirected to an older, weaker model, opening the door to jailbreaks, hallucinations, and unsafe outputs.
The post GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models appeared first on SecurityWeek.
By focusing on fundamentals, enterprises can avoid the distraction of hype and build security programs that are consistent, resilient, and effective over the long run.
The post Slow and Steady Security: Lessons from the Tortoise and the Hare appeared first on SecurityWeek.
Elastic has found no evidence of a vulnerability leading to RCE after details and PoC of a Defend EDR bypass were published online.
The post Elastic Refutes Claims of Zero-Day in EDR Product appeared first on SecurityWeek.
The US Department of Justice has announced the takedown of the RapperBot botnet and charges against its American administrator.
The post RapperBot Botnet Disrupted, American Administrator Indicted appeared first on SecurityWeek.
Seemplicity announced a Series B funding round that will be used to create AI agents for its exposure management solution.
The post Seemplicity Raises $50 Million for Exposure Management Platform appeared first on SecurityWeek.
Wed Aug 20 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
PipeMagic, which poses as a ChatGPT application, is a modular malware framework that provides persistent access and flexibility.
The post Microsoft Dissects PipeMagic Modular Backdoor appeared first on SecurityWeek.
TPG Telecom has disclosed a cybersecurity incident after discovering unauthorized access to an iiNet order management system.
The post Australia’s TPG Telecom Investigating iiNet Hack appeared first on SecurityWeek.
Britain abandoned its demand that Apple provide backdoor access to any encrypted user data stored in the cloud.
The post Gabbard Says UK Scraps Demand for Apple to Give Backdoor Access to Data appeared first on SecurityWeek.
Bragg Gaming Group says hackers accessed its internal systems over the weekend, but did not affect its operations.
The post Gambling Tech Firm Bragg Discloses Cyberattack appeared first on SecurityWeek.
Al-Tahery Al-Mashriky of the Yemen Cyber Army has been accused of hacking into and defacing many websites as part of hacktivist campaigns.
The post Hacktivist Sentenced to 20 Months of Prison in UK appeared first on SecurityWeek.
Tue Aug 19 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
From hacked satellites to nuclear threats in orbit, the battle for dominance beyond Earth is redefining modern warfare and national security.
The post Hijacked Satellites and Orbiting Space Weapons: In the 21st Century, Space Is the New Battlefield appeared first on SecurityWeek.
Researchers detailed a new 5G attack named Sni5Gect that can allow attackers to sniff traffic and cause disruption.
The post Novel 5G Attack Bypasses Need for Malicious Base Station appeared first on SecurityWeek.
More than 870 N-able N-central instances have not been patched against CVE-2025-8875 and CVE-2025-8876, two exploited vulnerabilities.
The post Hundreds of N-able N-central Instances Affected by Exploited Vulnerabilities appeared first on SecurityWeek.
Workday appears to have joined the list of major companies that had their Salesforce instances targeted by hackers.
The post Workday Data Breach Bears Signs of Widespread Salesforce Hack appeared first on SecurityWeek.
The US has indicted Zeppelin ransomware operator Ianis Antropenko, seizing over $2.8 million in cryptocurrency from his wallet.
The post US Seizes $2.8 Million From Zeppelin Ransomware Operator appeared first on SecurityWeek.
Mon Aug 18 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
CodeSecCon is the premier virtual event bringing together developers and cybersecurity professionals to revolutionize the way applications are built, secured, and maintained.
The post Watch Now: CodeSecCon – Where Software Security’s Next Chapter Unfolds (Virtual Event) appeared first on SecurityWeek.
Other noteworthy stories that might have slipped under the radar: Canada’s House of Commons hacked, Russia behind court system attack, Pennsylvania AG targeted in cyberattack.
The post In Other News: Critical Zoom Flaw, City’s Water Threatened by Hack, $330 Billion OT Cyber Risk appeared first on SecurityWeek.
With cybersecurity budgets strained, organizations are turning to AI-powered automation to plug staffing gaps, maintain defenses, and survive escalating threats.
The post Tight Cybersecurity Budgets Accelerate the Shift to AI-Driven Defense appeared first on SecurityWeek.
Android pKVM has achieved SESIP Level 5 certification, which means it’s resistant to highly skilled, motivated, and funded attackers.
The post Google Says Android pKVM Earns Highest Level of Security Assurance appeared first on SecurityWeek.
Rockwell Automation has published several advisories describing critical and high-severity vulnerabilities affecting its products.
The post Critical Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Products appeared first on SecurityWeek.
Sun Aug 17 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
CodeSecCon is the premier virtual event bringing together developers and cybersecurity professionals to revolutionize the way applications are built, secured, and maintained.
The post Watch Now: CodeSecCon – Where Software Security’s Next Chapter Unfolds (Virtual Event) appeared first on SecurityWeek.
Other noteworthy stories that might have slipped under the radar: Canada’s House of Commons hacked, Russia behind court system attack, Pennsylvania AG targeted in cyberattack.
The post In Other News: Critical Zoom Flaw, City’s Water Threatened by Hack, $330 Billion OT Cyber Risk appeared first on SecurityWeek.
With cybersecurity budgets strained, organizations are turning to AI-powered automation to plug staffing gaps, maintain defenses, and survive escalating threats.
The post Tight Cybersecurity Budgets Accelerate the Shift to AI-Driven Defense appeared first on SecurityWeek.
Android pKVM has achieved SESIP Level 5 certification, which means it’s resistant to highly skilled, motivated, and funded attackers.
The post Google Says Android pKVM Earns Highest Level of Security Assurance appeared first on SecurityWeek.
Rockwell Automation has published several advisories describing critical and high-severity vulnerabilities affecting its products.
The post Critical Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Products appeared first on SecurityWeek.
Sat Aug 16 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Other noteworthy stories that might have slipped under the radar: Canada’s House of Commons hacked, Russia behind court system attack, Pennsylvania AG targeted in cyberattack.
The post In Other News: Critical Zoom Flaw, City’s Water Threatened by Hack, $330 Billion OT Cyber Risk appeared first on SecurityWeek.
With cybersecurity budgets strained, organizations are turning to AI-powered automation to plug staffing gaps, maintain defenses, and survive escalating threats.
The post Tight Cybersecurity Budgets Accelerate the Shift to AI-Driven Defense appeared first on SecurityWeek.
Android pKVM has achieved SESIP Level 5 certification, which means it’s resistant to highly skilled, motivated, and funded attackers.
The post Google Says Android pKVM Earns Highest Level of Security Assurance appeared first on SecurityWeek.
Rockwell Automation has published several advisories describing critical and high-severity vulnerabilities affecting its products.
The post Critical Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Products appeared first on SecurityWeek.
Cisco has released over 20 advisories as part of its August 2025 bundled publication for ASA, FMC and FTD products.
The post Cisco Patches Critical Vulnerability in Firewall Management Platform appeared first on SecurityWeek.
Fri Aug 15 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Path traversal and XXE injection flaws allowing unauthenticated remote code execution have been patched in Xerox FreeFlow Core.
The post Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution appeared first on SecurityWeek.
CISA reported becoming aware of attacks exploiting CVE-2025-8875 and CVE-2025-8876 in N-able N-central on the day they were patched.
The post CISA Warns of Attacks Exploiting N-able Vulnerabilities appeared first on SecurityWeek.
The new DDoS attack vector, which involves HTTP/2 implementation flaws, has been compared to Rapid Reset.
The post ‘MadeYouReset’ HTTP2 Vulnerability Enables Massive DDoS Attacks appeared first on SecurityWeek.
Researchers at enterprise browser security firm SquareX showed how an attacker can impersonate a user and bypass passkey security.
The post Passkey Login Bypassed via WebAuthn Process Manipulation appeared first on SecurityWeek.
During the April incident, hackers gained access to a digital system which remotely controls one of the dam’s valves and opened it to increase the water flow.
The post Norwegian Police Say Pro-Russian Hackers Were Likely Behind Suspected Sabotage at a Dam appeared first on SecurityWeek.
Thu Aug 14 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
During the April incident, hackers gained access to a digital system which remotely controls one of the dam’s valves and opened it to increase the water flow.
The post Norwegian Police Say Pro-Russian Hackers Were Likely Behind Suspected Sabotage at a Dam appeared first on SecurityWeek.
Intel, AMD and Nvidia have published security advisories describing vulnerabilities found recently in their products.
The post Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia appeared first on SecurityWeek.
The RansomHub ransomware group stole sensitive information from staffing and recruiting firm Manpower in January.
The post Manpower Says Data Breach Stemming From Ransomware Attack Impacts 140,000 appeared first on SecurityWeek.
Fortinet and Ivanti have published new security advisories for their August 2025 Patch Tuesday updates.
The post Fortinet, Ivanti Release August 2025 Security Patches appeared first on SecurityWeek.
August 2025 ICS Patch Tuesday advisories have been published by Siemens, Schneider, Aveva, Honeywell, ABB and Phoenix Contact.
The post ICS Patch Tuesday: Major Vendors Address Code Execution Vulnerabilities appeared first on SecurityWeek.
Wed Aug 13 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Adobe’s security updates fix vulnerabilities in Commerce, Substance, InDesign, FrameMaker, Dimension and other products.
The post Adobe Patches Over 60 Vulnerabilities Across 13 Products appeared first on SecurityWeek.
Microsoft’s August 2025 Patch Tuesday updates address critical vulnerabilities in Windows, Office, and Hyper-V.
The post Microsoft Patches Over 100 Vulnerabilities appeared first on SecurityWeek.
Rapid7’s analysis of dark web forums reveals a thriving market where elite hackers sell corporate network access to buyers, turning cybercrime into a streamlined business.
The post Inside the Dark Web’s Access Economy: How Hackers Sell the Keys to Enterprise Networks appeared first on SecurityWeek.
1Kosmos has raised $57 million in Series B funding, which brings the total raised by the company to $72 million.
The post 1Kosmos Raises $57 Million for Identity Verification and Authentication Platform appeared first on SecurityWeek.
Taking place August 12-13, CodeSecCon is the premier virtual event bringing together developers and cybersecurity professionals to revolutionize the way applications are built, secured, and maintained.
The post Now Live: CodeSecCon – Where Software Security’s Next Chapter Unfolds (Virtual Event) appeared first on SecurityWeek.
Tue Aug 12 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
A researcher has been given the highest reward in Google’s Chrome bug bounty program for a sandbox escape with remote code execution.
The post Chrome Sandbox Escape Earns Researcher $250,000 appeared first on SecurityWeek.
New physics-based research suggests large language models could predict when their own answers are about to go wrong — a potential game changer for trust, risk, and security in AI-driven systems.
The post Managing the Trust-Risk Equation in AI: Predicting Hallucinations Before They Strike appeared first on SecurityWeek.
Hackers targeted Connex, one of the largest credit unions in Connecticut, and likely stole files containing personal information.
The post Connex Credit Union Data Breach Impacts 172,000 People appeared first on SecurityWeek.
A researcher has demonstrated how a platform used by over 1,000 dealerships in the US could have been used to hack cars.
The post Flaws in Major Automaker’s Dealership Systems Allowed Car Hacking, Personal Data Theft appeared first on SecurityWeek.
WinRAR has patched CVE-2025-8088, a zero-day exploited by Russia’s RomCom in attacks on financial, defense, manufacturing and logistics companies.
The post Russian Hackers Exploited WinRAR Zero-Day in Attacks on Europe, Canada appeared first on SecurityWeek.
Mon Aug 11 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Researchers showed how flaws in a bus’ onboard and remote systems can be exploited by hackers for tracking, control and spying.
The post Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking appeared first on SecurityWeek.
Researchers demonstrate how multi-turn “storytelling” attacks bypass prompt-level filters, exposing systemic weaknesses in GPT-5’s defenses.
The post Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise appeared first on SecurityWeek.
Taking place August 12-13, CodeSecCon is the premier virtual event bringing together developers and cybersecurity professionals to revolutionize the way applications are built, secured, and maintained.
The post CodeSecCon 2025: Where Software Security’s Next Chapter Unfolds appeared first on SecurityWeek.
As attackers target help desks and identity systems, traditional security perimeters are proving insufficient against agile, socially-engineered threats.
The post Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector appeared first on SecurityWeek.
Noteworthy stories that might have slipped under the radar: federal court filing system hack, Chanel data breach, emergency CISA directive.
The post In Other News: Nvidia Says No to Backdoors, Satellite Hacking, Energy Sector Assessment appeared first on SecurityWeek.
Sun Aug 10 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Researchers showed how flaws in a bus’ onboard and remote systems can be exploited by hackers for tracking, control and spying.
The post Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking appeared first on SecurityWeek.
Researchers demonstrate how multi-turn “storytelling” attacks bypass prompt-level filters, exposing systemic weaknesses in GPT-5’s defenses.
The post Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise appeared first on SecurityWeek.
Taking place August 12-13, CodeSecCon is the premier virtual event bringing together developers and cybersecurity professionals to revolutionize the way applications are built, secured, and maintained.
The post CodeSecCon 2025: Where Software Security’s Next Chapter Unfolds appeared first on SecurityWeek.
As attackers target help desks and identity systems, traditional security perimeters are proving insufficient against agile, socially-engineered threats.
The post Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector appeared first on SecurityWeek.
Noteworthy stories that might have slipped under the radar: federal court filing system hack, Chanel data breach, emergency CISA directive.
The post In Other News: Nvidia Says No to Backdoors, Satellite Hacking, Energy Sector Assessment appeared first on SecurityWeek.
Sat Aug 09 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Researchers demonstrate how multi-turn “storytelling” attacks bypass prompt-level filters, exposing systemic weaknesses in GPT-5’s defenses.
The post Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise appeared first on SecurityWeek.
Taking place August 12-13, CodeSecCon is the premier virtual event bringing together developers and cybersecurity professionals to revolutionize the way applications are built, secured, and maintained.
The post CodeSecCon 2025: Where Software Security’s Next Chapter Unfolds appeared first on SecurityWeek.
As attackers target help desks and identity systems, traditional security perimeters are proving insufficient against agile, socially-engineered threats.
The post Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector appeared first on SecurityWeek.
Noteworthy stories that might have slipped under the radar: federal court filing system hack, Chanel data breach, emergency CISA directive.
The post In Other News: Nvidia Says No to Backdoors, Satellite Hacking, Energy Sector Assessment appeared first on SecurityWeek.
Many companies are showcasing their products and services this week at the 2025 edition of the Black Hat conference in Las Vegas.
The post Black Hat USA 2025 – Summary of Vendor Announcements (Part 4) appeared first on SecurityWeek.
Fri Aug 08 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
SonicWall has been investigating reports about a zero-day potentially being exploited in ransomware attacks, but found no evidence of a new vulnerability.
The post SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability appeared first on SecurityWeek.
Many companies are showcasing their products and services this week at the 2025 edition of the Black Hat conference in Las Vegas.
The post Black Hat USA 2025 – Summary of Vendor Announcements (Part 3) appeared first on SecurityWeek.
Airlines Air France and KLM have disclosed a data breach stemming from unauthorized access to a third-party platform.
The post Air France, KLM Say Hackers Accessed Customer Data appeared first on SecurityWeek.
CISA and Microsoft have issued advisories for CVE-2025-53786, a high-severity flaw allowing privilege escalation in cloud environments.
The post Organizations Warned of Vulnerability in Microsoft Exchange Hybrid Deployment appeared first on SecurityWeek.
A desync attack method leveraging HTTP/1.1 vulnerabilities impacted many websites and earned researchers more than $200,000 in bug bounties.
The post New HTTP Request Smuggling Attacks Impacted CDNs, Major Orgs, Millions of Websites appeared first on SecurityWeek.
Thu Aug 07 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Zenity has shown how AI assistants such as ChatGPT, Copilot, Cursor, Gemini, and Salesforce Einstein can be abused using specially crafted prompts.
The post Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation appeared first on SecurityWeek.
CyberArk has patched several vulnerabilities that could be chained for unauthenticated remote code execution.
The post Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities appeared first on SecurityWeek.
A Google Salesforce instance may have been targeted as part of a ShinyHunters campaign that hit several major companies.
The post Google Discloses Data Breach via Salesforce Hack appeared first on SecurityWeek.
Splunk researchers developed a system to fingerprint post-logon behavior, using AI to find subtle signals of intrusion.
The post PLoB: A Behavioral Fingerprinting Framework to Hunt for Malicious Logins appeared first on SecurityWeek.
Meta linked these scams to a criminal scam center in Cambodia — and said it disrupted the campaign in partnership with ChatGPT maker OpenAI.
The post WhatsApp Takes Down 6.8 Million Accounts Linked to Criminal Scam Centers, Meta Says appeared first on SecurityWeek.
Wed Aug 06 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Microsoft has unveiled Project Ire, a prototype autonomous AI agent that can analyze any software file to determine if it’s malicious.
The post Microsoft’s Project Ire Autonomously Reverse Engineers Software to Find Malware appeared first on SecurityWeek.
Cisco has disclosed a data breach affecting Cisco.com user accounts, including names, email address, and phone numbers.
The post Cisco Says User Data Stolen in CRM Hack appeared first on SecurityWeek.
As AI makes software development accessible to all, security teams face a new challenge: protecting applications built by non-developers at unprecedented speed and scale.
The post Vibe Coding: When Everyone’s a Developer, Who Secures the Code? appeared first on SecurityWeek.
Many companies are showcasing their products and services this week at the 2025 edition of the Black Hat conference in Las Vegas.
The post Black Hat USA 2025 – Summary of Vendor Announcements (Part 1) appeared first on SecurityWeek.
Approov has raised $6.7 million in Series A funding to advance its mobile application and API security solutions.
The post Approov Raises $6.7 Million for Mobile App Security appeared first on SecurityWeek.
Tue Aug 05 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Nvidia has patched over a dozen vulnerabilities in Triton Inference Server, including another set of vulnerabilities that threaten AI systems.
The post Nvidia Triton Vulnerabilities Pose Big Risk to AI Models appeared first on SecurityWeek.
CISA and FEMA announced two grants of more than $100 million for state, local, and tribal governments looking to improve cybersecurity.
The post US Announces $100 Million for State, Local and Tribal Cybersecurity appeared first on SecurityWeek.
Cisco’s latest jailbreak method reveals just how easily sensitive data can be extracted from chatbots trained on proprietary or copyrighted content.
The post AI Guardrails Under Fire: Cisco’s Jailbreak Demo Exposes AI Weak Points appeared first on SecurityWeek.
The US Senate voted to confirm Sean Cairncross as the National Cyber Director, five months after nominalization.
The post Sean Cairncross Confirmed by Senate as National Cyber Director appeared first on SecurityWeek.
Forty-four cybersecurity merger and acquisition (M&A) deals were announced in July 2025.
The post Cybersecurity M&A Roundup: 44 Deals Announced in July 2025 appeared first on SecurityWeek.
Mon Aug 04 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Should Gen Z to be treated as a separate attack surface within your company?
The post Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers appeared first on SecurityWeek.
Noteworthy stories that might have slipped under the radar: Microsoft investigates whether the ToolShell exploit was leaked via MAPP, two reports on port cybersecurity, physical backdoor used for ATM hacking attempt.
The post In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack appeared first on SecurityWeek.
Valid, complete reports detailing remote code execution or elevation of privilege bugs in .NET qualify for the maximum rewards.
The post Microsoft Boosts .NET Bounty Program Rewards to $40,000 appeared first on SecurityWeek.
Russian state-sponsored APT Secret Blizzard has used ISP-level AitM attacks to infect diplomatic devices with malware.
The post Russian Cyberspies Target Foreign Embassies in Moscow via AitM Attacks: Microsoft appeared first on SecurityWeek.
Safe has raised $70 million in Series C funding to advance cyber risk management through specialized AI agents.
The post Cyber Risk Management Firm Safe Raises $70 Million appeared first on SecurityWeek.
Sun Aug 03 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Should Gen Z to be treated as a separate attack surface within your company?
The post Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers appeared first on SecurityWeek.
Noteworthy stories that might have slipped under the radar: Microsoft investigates whether the ToolShell exploit was leaked via MAPP, two reports on port cybersecurity, physical backdoor used for ATM hacking attempt.
The post In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack appeared first on SecurityWeek.
Valid, complete reports detailing remote code execution or elevation of privilege bugs in .NET qualify for the maximum rewards.
The post Microsoft Boosts .NET Bounty Program Rewards to $40,000 appeared first on SecurityWeek.
Russian state-sponsored APT Secret Blizzard has used ISP-level AitM attacks to infect diplomatic devices with malware.
The post Russian Cyberspies Target Foreign Embassies in Moscow via AitM Attacks: Microsoft appeared first on SecurityWeek.
Safe has raised $70 million in Series C funding to advance cyber risk management through specialized AI agents.
The post Cyber Risk Management Firm Safe Raises $70 Million appeared first on SecurityWeek.
Sat Aug 02 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Should Gen Z to be treated as a separate attack surface within your company?
The post Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers appeared first on SecurityWeek.
Noteworthy stories that might have slipped under the radar: Microsoft investigates whether the ToolShell exploit was leaked via MAPP, two reports on port cybersecurity, physical backdoor used for ATM hacking attempt.
The post In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack appeared first on SecurityWeek.
Valid, complete reports detailing remote code execution or elevation of privilege bugs in .NET qualify for the maximum rewards.
The post Microsoft Boosts .NET Bounty Program Rewards to $40,000 appeared first on SecurityWeek.
Russian state-sponsored APT Secret Blizzard has used ISP-level AitM attacks to infect diplomatic devices with malware.
The post Russian Cyberspies Target Foreign Embassies in Moscow via AitM Attacks: Microsoft appeared first on SecurityWeek.
Safe has raised $70 million in Series C funding to advance cyber risk management through specialized AI agents.
The post Cyber Risk Management Firm Safe Raises $70 Million appeared first on SecurityWeek.
Fri Aug 01 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Noma Security has announced a Series B funding round that will enable the company’s growth and expansion of its AI agent security solutions.
The post Noma Security Raises $100 Million for AI Security Platform appeared first on SecurityWeek.
Chinese military and cyber researchers are intensifying efforts to counter Elon Musk’s Starlink satellite network, viewing it as a potential tool for U.S. military power across nuclear, space, and cyber domains.
The post Chinese Researchers Suggest Lasers and Sabotage to Counter Musk’s Starlink Satellites appeared first on SecurityWeek.
Reach Security has received a $10 million strategic investment from M12 to advance its domain-specific AI approach for exposure management.
The post Reach Security Raises $10 Million for Exposure Management Solution appeared first on SecurityWeek.
The tool includes resources to help organizations during the containment and eviction stages of incident response.
The post Open Source CISA Tool Helps Defenders With Hacker Containment, Eviction appeared first on SecurityWeek.
Why context, behavioral baselines, and multi-source visibility are the new pillars of identity security in a world where credentials alone no longer cut it.
The post Who’s Really Behind the Mask? Combatting Identity Fraud appeared first on SecurityWeek.
Thu Jul 31 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Committee Members voted to recommend Sean Plankey for director of the Cybersecurity and Infrastructure Security Agency.
The post Senate Committee Advances Trump Nominee to Lead CISA appeared first on SecurityWeek.
BlinkOps has announced a Series B funding round that brings the total raised by the company for its micro-agents builder to $90 million.
The post BlinkOps Raises $50 Million for Agentic Security Automation Platform appeared first on SecurityWeek.
Legion has raised $38 million in seed and Series A funding for its browser-native AI Security Operations Center (SOC) platform.
The post Legion Emerges From Stealth With $38 Million in Funding appeared first on SecurityWeek.
Multiple financially motivated threat actors are targeting backup systems and employing Scattered Spider’s social engineering techniques.
The post Scattered Spider Activity Drops Following Arrests, but Others Adopting Group’s Tactics appeared first on SecurityWeek.
Strategic acquisitions marks Palo Alto Networks' formal entry into the identity security space and accelerates its platform strategy.
The post Palo Alto Networks to Acquire CyberArk for $25 Billion appeared first on SecurityWeek.
Wed Jul 30 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Tea has said about 72,000 images were leaked online in the initial incident, and another 59,000 images publicly viewable in the app from posts, comments and direct messages were also accessed.
The post Tea App Takes Messaging System Offline After Second Security Issue Reported appeared first on SecurityWeek.
Vulnerabilities discovered by Binarly in Lenovo devices allow privilege escalation, code execution, and security bypass.
The post Lenovo Firmware Vulnerabilities Allow Persistent Implant Deployment appeared first on SecurityWeek.
The open source security firm will use the investment to enhance go-to-market efforts and accelerate platform expansion.
The post Seal Security Raises $13 Million to Secure Software Supply Chain appeared first on SecurityWeek.
Promptfoo has raised $18.4 million in Series A funding to help organizations secure LLMs and generative AI applications.
The post Promptfoo Raises $18.4 Million for AI Security Platform appeared first on SecurityWeek.
The need for secure encryption in IoT and IIoT devices is obvious, and potentially critical for OT and, by extension, much of the critical infrastructure.
The post Order Out of Chaos – Using Chaos Theory Encryption to Protect OT and IoT appeared first on SecurityWeek.
Tue Jul 29 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Deepfakes are causing security problems for governments, businesses and individuals and making trust the most valuable currency of the digital age.
The post Creating Realistic Deepfakes Is Getting Easier Than Ever. Fighting Back May Take Even More AI appeared first on SecurityWeek.
Ukrainian and Belarusian hacker groups, which oppose the rule of Belarusian President Alexander Lukashenko, claimed responsibility for the cyberattack.
The post Cyberattack On Russian Airline Aeroflot Causes the Cancellation of More Than 100 Flights appeared first on SecurityWeek.
NASCAR says names, Social Security numbers, and other personal information was stolen in an April 2025 ransomware attack.
The post NASCAR Confirms Personal Information Stolen in Ransomware Attack appeared first on SecurityWeek.
Root Evidence is developing fully integrated vulnerability scanning and attack surface management technology.
The post Root Evidence Launches With $12.5 Million in Seed Funding appeared first on SecurityWeek.
The financially motivated group is pivoting from Active Directory to VMware vSphere environments, deploying ransomware from the hypervisor.
The post Scattered Spider Targeting VMware vSphere Environments appeared first on SecurityWeek.
Mon Jul 28 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Noteworthy stories that might have slipped under the radar: Google Cloud Build vulnerability earns researcher big bounty, more countries hit by Louis Vuitton data breach, organizations’ attack surface is increasing.
The post In Other News: $30k Google Cloud Build Flaw, Louis Vuitton Breach Update, Attack Surface Growth appeared first on SecurityWeek.
An authentication bypass vulnerability in Mitel MiVoice MX-ONE could allow attackers to access user or admin accounts on the system.
The post Mitel Patches Critical Flaw in Enterprise Communication Platform appeared first on SecurityWeek.
The Koske Linux malware shows how cybercriminals can use AI for payload development, persistence, and adaptivity.
The post Sophisticated Koske Linux Malware Developed With AI Aid appeared first on SecurityWeek.
Ollie Holman was sentenced to prison for selling over 1,000 phishing kits that caused estimated losses of over $134 million.
The post UK Student Sentenced to Prison for Selling Phishing Kits appeared first on SecurityWeek.
Chinese cyberespionage group Fire Ant is targeting virtualization and networking infrastructure to access isolated environments.
The post Chinese Spies Target Networking and Virtualization Flaws to Breach Isolated Environments appeared first on SecurityWeek.
Sun Jul 27 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Noteworthy stories that might have slipped under the radar: Google Cloud Build vulnerability earns researcher big bounty, more countries hit by Louis Vuitton data breach, organizations’ attack surface is increasing.
The post In Other News: $30k Google Cloud Build Flaw, Louis Vuitton Breach Update, Attack Surface Growth appeared first on SecurityWeek.
An authentication bypass vulnerability in Mitel MiVoice MX-ONE could allow attackers to access user or admin accounts on the system.
The post Mitel Patches Critical Flaw in Enterprise Communication Platform appeared first on SecurityWeek.
The Koske Linux malware shows how cybercriminals can use AI for payload development, persistence, and adaptivity.
The post Sophisticated Koske Linux Malware Developed With AI Aid appeared first on SecurityWeek.
Ollie Holman was sentenced to prison for selling over 1,000 phishing kits that caused estimated losses of over $134 million.
The post UK Student Sentenced to Prison for Selling Phishing Kits appeared first on SecurityWeek.
Chinese cyberespionage group Fire Ant is targeting virtualization and networking infrastructure to access isolated environments.
The post Chinese Spies Target Networking and Virtualization Flaws to Breach Isolated Environments appeared first on SecurityWeek.
Sat Jul 26 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Noteworthy stories that might have slipped under the radar: Google Cloud Build vulnerability earns researcher big bounty, more countries hit by Louis Vuitton data breach, organizations’ attack surface is increasing.
The post In Other News: $30k Google Cloud Build Flaw, Louis Vuitton Breach Update, Attack Surface Growth appeared first on SecurityWeek.
An authentication bypass vulnerability in Mitel MiVoice MX-ONE could allow attackers to access user or admin accounts on the system.
The post Mitel Patches Critical Flaw in Enterprise Communication Platform appeared first on SecurityWeek.
The Koske Linux malware shows how cybercriminals can use AI for payload development, persistence, and adaptivity.
The post Sophisticated Koske Linux Malware Developed With AI Aid appeared first on SecurityWeek.
Ollie Holman was sentenced to prison for selling over 1,000 phishing kits that caused estimated losses of over $134 million.
The post UK Student Sentenced to Prison for Selling Phishing Kits appeared first on SecurityWeek.
Chinese cyberespionage group Fire Ant is targeting virtualization and networking infrastructure to access isolated environments.
The post Chinese Spies Target Networking and Virtualization Flaws to Breach Isolated Environments appeared first on SecurityWeek.
Fri Jul 25 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
HeroDevs has received a $125 million strategic growth investment from PSG to secure enterprise security stacks.
The post HeroDevs Raises $125 Million to Secure Deprecated OSS appeared first on SecurityWeek.
The proposed cyber regulations include the implementation of incident reporting, response plans, and cybersecurity controls, training, and certification of compliance.
The post New York Seeking Public Opinion on Water Systems Cyber Regulations appeared first on SecurityWeek.
Risk management and compliance solutions provider Vanta has raised more than $500 million since 2021.
The post GRC Firm Vanta Raises $150 Million at $4.15 Billion Valuation appeared first on SecurityWeek.
Clorox is blaming Congnizat for the 2023 cyberattack, claiming that the IT provided handed over passwords to the hackers.
The post Clorox Sues Cognizant for $380 Million Over 2023 Hack appeared first on SecurityWeek.
Hackers have injected malware into popular NPM packages after compromising several developer accounts in a fresh phishing campaign.
The post High-Value NPM Developers Compromised in New Phishing Campaign appeared first on SecurityWeek.
Thu Jul 24 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
AI voice clones can impersonate people in a way that Altman said is increasingly “indistinguishable from reality” and will require new methods for verification.
The post OpenAI’s Sam Altman Warns of AI Voice Fraud Crisis in Banking appeared first on SecurityWeek.
Experts unpack the risks of trusting agentic AI, arguing that fallibility, hype, and a lack of transparency demand caution—before automation outpaces our understanding.
The post Should We Trust AI? Three Approaches to AI Fallibility appeared first on SecurityWeek.
French authorities announced that an alleged admin of XSS.is, one of the longest-running cybercrime forums, has been arrested in Ukraine.
The post France Says Administrator of Cybercrime Forum XSS Arrested in Ukraine appeared first on SecurityWeek.
Critics warn that a ban on ransomware payments may lead to dangerous unintended consequences, including forcing victims into secrecy or incentivizing attackers to shift tactics.
The post UK’s Ransomware Payment Ban: Bold Strategy or Dangerous Gamble? appeared first on SecurityWeek.
Akamai’s analysis of the Coyote malware revealed that it abuses Microsoft’s UIA accessibility framework to obtain data.
The post Coyote Banking Trojan First to Abuse Microsoft UIA appeared first on SecurityWeek.
Wed Jul 23 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Microsoft says the Chinese threat actors Linen Typhoon, Violet Typhoon, and Storm-2603 have been exploiting the ToolShell zero-days.
The post Microsoft Says Chinese APTs Exploited ToolShell Zero-Days Weeks Before Patch appeared first on SecurityWeek.
Once a manageable function, security operations has become a battlefield of complexity.
The post Reclaiming Control: How Enterprises Can Fix Broken Security Operations appeared first on SecurityWeek.
Dell confirms the compromise of a demo environment containing synthetic data after hackers leak allegedly stolen information.
The post Dell Says Data Leaked by Hackers Is Fake appeared first on SecurityWeek.
Eight vulnerabilities, including ones allowing full control over a device, have been discovered and patched in Helmholz REX 100 industrial routers.
The post Vulnerabilities Expose Helmholz Industrial Routers to Hacking appeared first on SecurityWeek.
AI-powered cybersecurity company Darktrace has acquired network traffic visibility provider Mira Security.
The post Darktrace Acquires Mira Security appeared first on SecurityWeek.
Tue Jul 22 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Iranian APT MuddyWater has been using new versions of the DCHSpy Android surveillance tool since the beginning of the conflict with Israel.
The post Iranian APT Targets Android Users With New Variants of DCHSpy Spyware appeared first on SecurityWeek.
Cierant Corporation and Zumpano Patricios independently disclosed data breaches, each impacting more than 200,000 individuals.
The post Marketing, Law Firms Say Data Breaches Impact Over 200,000 People appeared first on SecurityWeek.
A surveillance company was caught using an SS7 bypass technique to trick wireless carriers into divulging users’ locations.
The post Surveillance Firm Bypasses SS7 Protections to Retrieve User Location appeared first on SecurityWeek.
The Alcohol & Drug Testing Service (TADTS) says personal information was stolen in a July 2024 ransomware attack.
The post 750,000 Impacted by Data Breach at The Alcohol & Drug Testing Service appeared first on SecurityWeek.
Microsoft has started releasing updates to fix the exploited SharePoint zero-days tracked as CVE-2025-53770 and CVE-2025-53771.
The post Microsoft Patches ‘ToolShell’ Zero-Days Exploited to Hack SharePoint Servers appeared first on SecurityWeek.
Mon Jul 21 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Enterprises running SharePoint servers should not wait for a fix for CVE-2025-53770 and should commence threat hunting to search for compromise immediately.
The post SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – No Patch Available appeared first on SecurityWeek.
Noteworthy stories that might have slipped under the radar: powerful US law firm hacked by China, Symantec product flaw, $10,000 Meta AI hack, cryptocurrency thieves bypassing FIDO keys.
The post In Other News: Law Firm Hacked by China, Symantec Flaw, Meta AI Hack, FIDO Key Bypass appeared first on SecurityWeek.
AI-native email security firm StrongestLayer has emerged from stealth mode with $5.2 million in seed funding.
The post Email Protection Startup StrongestLayer Emerges From Stealth Mode appeared first on SecurityWeek.
Dozens of FortiWeb instances have been hacked after PoC targeting a recent critical vulnerability was shared publicly.
The post Fortinet FortiWeb Flaw Exploited in the Wild After PoC Publication appeared first on SecurityWeek.
Radiology Associates of Richmond has disclosed a data breach impacting protected health and personal information.
The post 1.4 Million Affected by Data Breach at Virginia Radiology Practice appeared first on SecurityWeek.
Sun Jul 20 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Noteworthy stories that might have slipped under the radar: powerful US law firm hacked by China, Symantec product flaw, $10,000 Meta AI hack, cryptocurrency thieves bypassing FIDO keys.
The post In Other News: Law Firm Hacked by China, Symantec Flaw, Meta AI Hack, FIDO Key Bypass appeared first on SecurityWeek.
AI-native email security firm StrongestLayer has emerged from stealth mode with $5.2 million in seed funding.
The post Email Protection Startup StrongestLayer Emerges From Stealth Mode appeared first on SecurityWeek.
Dozens of FortiWeb instances have been hacked after PoC targeting a recent critical vulnerability was shared publicly.
The post Fortinet FortiWeb Flaw Exploited in the Wild After PoC Publication appeared first on SecurityWeek.
Radiology Associates of Richmond has disclosed a data breach impacting protected health and personal information.
The post 1.4 Million Affected by Data Breach at Virginia Radiology Practice appeared first on SecurityWeek.
With generative AI enabling fraud-as-a-service at scale, legacy defenses are crumbling. The next wave of cybercrime is faster, smarter, and terrifyingly synthetic.
The post Fraud: A Growth Industry Powered by Gen-AI appeared first on SecurityWeek.
Sat Jul 19 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Noteworthy stories that might have slipped under the radar: powerful US law firm hacked by China, Symantec product flaw, $10,000 Meta AI hack, cryptocurrency thieves bypassing FIDO keys.
The post In Other News: Law Firm Hacked by China, Symantec Flaw, Meta AI Hack, FIDO Key Bypass appeared first on SecurityWeek.
AI-native email security firm StrongestLayer has emerged from stealth mode with $5.2 million in seed funding.
The post Email Protection Startup StrongestLayer Emerges From Stealth Mode appeared first on SecurityWeek.
Dozens of FortiWeb instances have been hacked after PoC targeting a recent critical vulnerability was shared publicly.
The post Fortinet FortiWeb Flaw Exploited in the Wild After PoC Publication appeared first on SecurityWeek.
Radiology Associates of Richmond has disclosed a data breach impacting protected health and personal information.
The post 1.4 Million Affected by Data Breach at Virginia Radiology Practice appeared first on SecurityWeek.
With generative AI enabling fraud-as-a-service at scale, legacy defenses are crumbling. The next wave of cybercrime is faster, smarter, and terrifyingly synthetic.
The post Fraud: A Growth Industry Powered by Gen-AI appeared first on SecurityWeek.
Fri Jul 18 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Virtual event brings together leading experts, practitioners, and innovators for a full day of insightful discussions and tactical guidance on evolving threats and real-world defense strategies in cloud security.
The post Watch on Demand: Cloud & Data Security Summit – Tackling Exposed Attack Surfaces in the Cloud appeared first on SecurityWeek.
Cybersecurity startup Empirical Security has raised $12 million in seed funding for its vulnerability management platform.
The post Empirical Security Raises $12 Million for AI-Driven Vulnerability Management appeared first on SecurityWeek.
Karen Serobovich Vardanyan pleaded not guilty to charges related to his alleged role in the Ryuk ransomware operation.
The post Armenian Man Extradited to US Over Ryuk Ransomware Attacks appeared first on SecurityWeek.
Deployed on mobile devices confiscated by Chinese law enforcement, Massistant can collect user information, files, and location.
The post Mobile Forensics Tool Used by Chinese Law Enforcement Dissected appeared first on SecurityWeek.
An $8 billion class action investors’ lawsuit against Meta stemming from the 2018 privacy scandal involving the Cambridge Analytica political consulting firm.
The post Trial Opens Against Meta CEO Mark Zuckerberg and Other Leaders Over Facebook Privacy Violations appeared first on SecurityWeek.
Thu Jul 17 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
More than 1,000 suspects were arrested in raids in at least five provinces between Monday and Wednesday, according to Information Minister Neth Pheaktra and police.
The post Cambodia Makes 1,000 Arrests in Latest Crackdown on Cybercrime appeared first on SecurityWeek.
Codenamed Eastwood, the operation targeted the so-called NoName057(16) group, which was identified as being behind a series of DDoS attacks on municipalities and organizations linked to a NATO summit.
The post Europol-Coordinated Global Operation Takes Down Pro-Russian Cybercrime Network appeared first on SecurityWeek.
Cyberattack disrupted UNFI’s operations in June; company estimates $50–$60 million net income hit but anticipates insurance will cover most losses.
The post United Natural Foods Projects Up to $400M Sales Hit From June Cyberattack appeared first on SecurityWeek.
A threat actor that may be financially motivated is targeting SonicWall devices with a backdoor and user-mode rootkit.
The post SonicWall SMA Appliances Targeted With New ‘Overstep’ Malware appeared first on SecurityWeek.
Virtual event brings together leading experts, practitioners, and innovators for a full day of insightful discussions and tactical guidance on evolving threats and real-world defense strategies in cloud security.
The post Virtual Event Today: Cloud & Data Security Summit – Tackling Exposed Attack Surfaces in the Cloud appeared first on SecurityWeek.
Wed Jul 16 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Virtual event brings together leading experts, practitioners, and innovators for a full day of insightful discussions and tactical guidance on evolving threats and real-world defense strategies in cloud security.
The post Virtual Event Preview: Cloud & Data Security Summit – Tackling Exposed Attack Surfaces in the Cloud appeared first on SecurityWeek.
Obfuscated JavaScript code is embedded within SVG files for browser-native redirection to malicious pages.
The post Threat Actors Use SVG Smuggling for Browser-Native Redirection appeared first on SecurityWeek.
Cloudflare has published its quarterly DDoS threat report for Q2 2025 and the company says it has blocked millions of attacks.
The post DDoS Attacks Blocked by Cloudflare in 2025 Already Surpass 2024 Total appeared first on SecurityWeek.
Pennsylvania-based Century Support Services is disclosing a data breach after its systems were hacked in November 2024.
The post Data Breach at Debt Settlement Firm Impacts 160,000 People appeared first on SecurityWeek.
Zip Security’s Series A funding round led by Ballistic Ventures will help the company grow its engineering and go-to-market teams.
The post Zip Security Raises $13.5 Million in Series A Funding appeared first on SecurityWeek.
Tue Jul 15 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
A vulnerability affecting systems named End-of-Train and Head-of-Train can be exploited by hackers to cause trains to brake.
The post Train Brakes Can Be Hacked Over Radio—And the Industry Knew for 20 Years appeared first on SecurityWeek.
CISA considers the recently disclosed CitrixBleed 2 vulnerability an unacceptable risk and has added it to the KEV catalog.
The post CitrixBleed 2 Flaw Poses Unacceptable Risk: CISA appeared first on SecurityWeek.
Google Gemini for Workspace can be tricked into displaying a phishing message when asked to summarize an email.
The post Google Gemini Tricked Into Showing Phishing Message Hidden in Email appeared first on SecurityWeek.
The Interlock ransomware group has partnered with the KongTuke TDS to distribute a new RAT variant via FileFix attacks.
The post New Interlock RAT Variant Distributed via FileFix Attacks appeared first on SecurityWeek.
Vulnerabilities in Gigabyte firmware implementations could allow attackers to disable Secure Boot and execute code during the early boot phase.
The post Flaws in Gigabyte Firmware Allow Security Bypass, Backdoor Deployment appeared first on SecurityWeek.
Mon Jul 14 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Investigators from HMRC joined more than 100 Romanian police officers to arrest the 13 Romanian suspects in the counties of Ilfov, Giurgiu and Calarasi.
The post 13 Romanians Arrested for Phishing the UK’s Tax Service appeared first on SecurityWeek.
The latest release of the xAI LLM, Grok-4, has already fallen to a sophisticated jailbreak.
The post Grok-4 Falls to a Jailbreak Two Days After Its Release appeared first on SecurityWeek.
Noteworthy stories that might have slipped under the radar: Microsoft shows attack against AMD processors, SentinelOne details latest ZuRu macOS malware version, Indian APT DoNot targets governments.
The post In Other News: Microsoft Finds AMD CPU Flaws, ZuRu macOS Malware Evolves, DoNot APT Targets Govs appeared first on SecurityWeek.
With IPOs taking longer than ever, the venture firm’s fund aims to keep startup veterans motivated while staying private.
The post Cyberstarts Launches $300M Liquidity Fund to Help Startups Retain Top Talent appeared first on SecurityWeek.
The EU code is voluntary and complements the EU’s AI Act, a comprehensive set of regulations that was approved last year and is taking effect in phases.
The post EU Unveils AI Code of Practice to Help Businesses Comply With Bloc’s Rules appeared first on SecurityWeek.
Sun Jul 13 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
The latest release of the xAI LLM, Grok-4, has already fallen to a sophisticated jailbreak.
The post Grok-4 Falls to a Jailbreak Two days After Its Release appeared first on SecurityWeek.
Noteworthy stories that might have slipped under the radar: Microsoft shows attack against AMD processors, SentinelOne details latest ZuRu macOS malware version, Indian APT DoNot targets governments.
The post In Other News: Microsoft Finds AMD CPU Flaws, ZuRu macOS Malware Evolves, DoNot APT Targets Govs appeared first on SecurityWeek.
With IPOs taking longer than ever, the venture firm’s fund aims to keep startup veterans motivated while staying private.
The post Cyberstarts Launches $300M Liquidity Fund to Help Startups Retain Top Talent appeared first on SecurityWeek.
The EU code is voluntary and complements the EU’s AI Act, a comprehensive set of regulations that was approved last year and is taking effect in phases.
The post EU Unveils AI Code of Practice to Help Businesses Comply With Bloc’s Rules appeared first on SecurityWeek.
Two vulnerabilities in an internal API allowed unauthorized access to contacts and chats, exposing the information of 64 million McDonald’s applicants.
The post McDonald’s Chatbot Recruitment Platform Exposed 64 Million Job Applications appeared first on SecurityWeek.
Sat Jul 12 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Noteworthy stories that might have slipped under the radar: Microsoft shows attack against AMD processors, SentinelOne details latest ZuRu macOS malware version, Indian APT DoNot targets governments.
The post In Other News: Microsoft Finds AMD CPU Flaws, ZuRu macOS Malware Evolves, DoNot APT Targets Govs appeared first on SecurityWeek.
With IPOs taking longer than ever, the venture firm’s fund aims to keep startup veterans motivated while staying private.
The post Cyberstarts Launches $300M Liquidity Fund to Help Startups Retain Top Talent appeared first on SecurityWeek.
The EU code is voluntary and complements the EU’s AI Act, a comprehensive set of regulations that was approved last year and is taking effect in phases.
The post EU Unveils AI Code of Practice to Help Businesses Comply With Bloc’s Rules appeared first on SecurityWeek.
Two vulnerabilities in an internal API allowed unauthorized access to contacts and chats, exposing the information of 64 million McDonald’s applicants.
The post McDonald’s Chatbot Recruitment Platform Exposed 64 Million Job Applications appeared first on SecurityWeek.
Wing FTP Server vulnerability CVE-2025-47812 can be exploited for arbitrary command execution with root or system privileges.
The post Critical Wing FTP Server Vulnerability Exploited appeared first on SecurityWeek.
Fri Jul 11 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Details have been disclosed for an eSIM hacking method that could impact many, but the industry is taking action.
The post eSIM Hack Allows for Cloning, Spying appeared first on SecurityWeek.
Ingram Micro has restored operations across all countries and regions after disconnecting systems to contain a ransomware attack.
The post Ingram Micro Restores Systems Impacted by Ransomware appeared first on SecurityWeek.
Three teens and a woman have been arrested by the UK’s NCA over the hacking of M&S, Co-op and Harrods.
The post Four Arrested in UK Over M&S, Co-op Cyberattacks appeared first on SecurityWeek.
Hackers compromised names, addresses, email address, phone numbers, and other information pertaining to Qantas customers.
The post Qantas Confirms 5.7 Million Impacted by Data Breach appeared first on SecurityWeek.
‘Machine identities’, often used interchangeably with ‘non-human identities’ (NHIs), have been increasing rapidly since the start of digital transformation.
The post Booz Allen Invests in Machine Identity Firm Corsha appeared first on SecurityWeek.
Thu Jul 10 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Nippon Steel Solutions has disclosed a data breach that resulted from the exploitation of a zero-day in network equipment.
The post Nippon Steel Subsidiary Blames Data Breach on Zero-Day Attack appeared first on SecurityWeek.
New Samsung Galaxy features include protections for on-device AI, expanded cross-device threat detection, and quantum-resistant encryption for network security.
The post Samsung Announces Security Improvements for Galaxy Smartphones appeared first on SecurityWeek.
Industrial solutions providers Siemens, Schneider Electric and Phoenix Contact have released July 2025 Patch Tuesday ICS security advisories.
The post ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact appeared first on SecurityWeek.
Multiple vulnerabilities in Ruckus Wireless management products could be exploited to fully compromise the managed environments.
The post Unpatched Ruckus Vulnerabilities Allow Wireless Environment Hacking appeared first on SecurityWeek.
Nova Scotia Power is notifying individuals affected by the recent data breach, including in the United States.
The post Canadian Electric Utility Says Power Meters Disrupted by Cyberattack appeared first on SecurityWeek.
Wed Jul 09 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Adobe patches were also released for medium-severity flaws in After Effects, Audition, Dimension, Experience Manager Screens, FrameMaker, Illustrator, Substance 3D Stager, and Substance 3D Viewer.
The post Adobe Patches Critical Code Execution Bugs appeared first on SecurityWeek.
Patch Tuesday July 2025: Microsoft rolled out fixes for 130 vulnerabilities, including a zero-day in SQL Server.
The post Microsoft Patches 130 Vulnerabilities for July 2025 Patch Tuesday appeared first on SecurityWeek.
The warning came after the department discovered that an impostor attempted to reach out to at least three foreign ministers, a U.S. senator and a governor.
The post Impostor Uses AI to Impersonate Rubio and Contact Foreign and US Officials appeared first on SecurityWeek.
A stolen copy of Shellter Elite shows how easily legitimate security tools can be repurposed by threat actors when vetting and oversight fail.
The post Legitimate Shellter Pen-Testing Tool Used in Malware Attacks appeared first on SecurityWeek.
As organizations rush to adopt agentic AI, security leaders must confront the growing risk of invisible threats and new attack vectors.
The post The Wild West of Agentic AI – An Attack Surface CISOs Can’t Afford to Ignore appeared first on SecurityWeek.
Tue Jul 08 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
CVE-2025-6554 and three other Chromium vulnerabilities could allow attackers to execute code and corrupt memory remotely.
The post Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild appeared first on SecurityWeek.
The notorious Hive successor ceases ransomware operations but pivots to pure data extortion under the new World Leaks brand.
The post Hunters International Shuts Down, Offers Free Decryptors as It Morphs Into World Leaks appeared first on SecurityWeek.
The IT products and services giant did not say how the intrusion occurred or whether any data was stolen from its systems.
The post Ingram Micro Scrambling to Restore Systems After Ransomware Attack appeared first on SecurityWeek.
Officials identified the suspect as João Roque, a C&M employee who worked in information technology and allegedly helped others gain unauthorized access to PIX systems.
The post Police in Brazil Arrest a Suspect Over $100M Banking Hack appeared first on SecurityWeek.
Noteworthy stories that might have slipped under the radar: drug cartel hires hacker to identify FBI informants, prison time for Russian ransomware developer, ransomware negotiator investigated.
The post In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed appeared first on SecurityWeek.
Mon Jul 07 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Noteworthy stories that might have slipped under the radar: drug cartel hires hacker to identify FBI informants, prison time for Russian ransomware developer, ransomware negotiator investigated.
The post In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed appeared first on SecurityWeek.
A vulnerability in the Catwatchful spyware allowed a security researcher to retrieve the usernames and passwords of over 62,000 accounts.
The post Undetectable Android Spyware Backfires, Leaks 62,000 User Logins appeared first on SecurityWeek.
Hardcoded SSH credentials in Cisco Unified CM and Unified CM SME could allow attackers to execute commands as root.
The post Cisco Warns of Hardcoded Credentials in Enterprise Software appeared first on SecurityWeek.
SentinelOne says the fake Zoom update scam delivers ‘NimDoor’, a rare Nim-compiled backdoor.
The post North Korean Hackers Use Fake Zoom Updates to Install macOS Malware appeared first on SecurityWeek.
Ransomware is a major threat to the enterprise. Tools and training help, but survival depends on one thing: your organization’s muscle memory to respond fast and recover stronger.
The post Like Ransoming a Bike: Organizational Muscle Memory Drives the Most Effective Response appeared first on SecurityWeek.
Sun Jul 06 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Noteworthy stories that might have slipped under the radar: drug cartel hires hacker to identify FBI informants, prison time for Russian ransomware developer, ransomware negotiator investigated.
The post In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed appeared first on SecurityWeek.
A vulnerability in the Catwatchful spyware allowed a security researcher to retrieve the usernames and passwords of over 62,000 accounts.
The post Undetectable Android Spyware Backfires, Leaks 62,000 User Logins appeared first on SecurityWeek.
Hardcoded SSH credentials in Cisco Unified CM and Unified CM SME could allow attackers to execute commands as root.
The post Cisco Warns of Hardcoded Credentials in Enterprise Software appeared first on SecurityWeek.
SentinelOne says the fake Zoom update scam delivers ‘NimDoor’, a rare Nim-compiled backdoor.
The post North Korean Hackers Use Fake Zoom Updates to Install macOS Malware appeared first on SecurityWeek.
Ransomware is a major threat to the enterprise. Tools and training help, but survival depends on one thing: your organization’s muscle memory to respond fast and recover stronger.
The post Like Ransoming a Bike: Organizational Muscle Memory Drives the Most Effective Response appeared first on SecurityWeek.
Sat Jul 05 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Noteworthy stories that might have slipped under the radar: drug cartel hires hacker to identify FBI informants, prison time for Russian ransomware developer, ransomware negotiator investigated.
The post In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed appeared first on SecurityWeek.
A vulnerability in the Catwatchful spyware allowed a security researcher to retrieve the usernames and passwords of over 62,000 accounts.
The post Undetectable Android Spyware Backfires, Leaks 62,000 User Logins appeared first on SecurityWeek.
Hardcoded SSH credentials in Cisco Unified CM and Unified CM SME could allow attackers to execute commands as root.
The post Cisco Warns of Hardcoded Credentials in Enterprise Software appeared first on SecurityWeek.
SentinelOne says the fake Zoom update scam delivers ‘NimDoor’, a rare Nim-compiled backdoor.
The post North Korean Hackers Use Fake Zoom Updates to Install macOS Malware appeared first on SecurityWeek.
Ransomware is a major threat to the enterprise. Tools and training help, but survival depends on one thing: your organization’s muscle memory to respond fast and recover stronger.
The post Like Ransoming a Bike: Organizational Muscle Memory Drives the Most Effective Response appeared first on SecurityWeek.
Fri Jul 04 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
A vulnerability in the Catwatchful spyware allowed a security researcher to retrieve the usernames and passwords of over 62,000 accounts.
The post Undetectable Android Spyware Backfires, Leaks 62,000 User Logins appeared first on SecurityWeek.
Hardcoded SSH credentials in Cisco Unified CM and Unified CM SME could allow attackers to execute commands as root.
The post Cisco Warns of Hardcoded Credentials in Enterprise Software appeared first on SecurityWeek.
SentinelOne says the fake Zoom update scam delivers ‘NimDoor’, a rare Nim-compiled backdoor.
The post North Korean Hackers Use Fake Zoom Updates to Install macOS Malware appeared first on SecurityWeek.
Ransomware is a major threat to the enterprise. Tools and training help, but survival depends on one thing: your organization’s muscle memory to respond fast and recover stronger.
The post Like Ransoming a Bike: Organizational Muscle Memory Drives the Most Effective Response appeared first on SecurityWeek.
The United States has warned of continued Iranian cyberattacks following American strikes on Iran’s nuclear facilities.
The post US Calls Reported Threats by Pro-Iran Hackers to Release Trump-Tied Material a ‘Smear Campaign’ appeared first on SecurityWeek.
Thu Jul 03 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Ransomware is a major threat to the enterprise. Tools and training help, but survival depends on one thing: your organization’s muscle memory to respond fast and recover stronger.
The post Like Ransoming a Bike: Organizational Muscle Memory Drives the Most Effective Response appeared first on SecurityWeek.
The United States has warned of continued Iranian cyberattacks following American strikes on Iran’s nuclear facilities.
The post US Calls Reported Threats by Pro-Iran Hackers to Release Trump-Tied Material a ‘Smear Campaign’ appeared first on SecurityWeek.
Forty-one cybersecurity merger and acquisition (M&A) deals were announced in June 2025.
The post Cybersecurity M&A Roundup: 41 Deals Announced in June 2025 appeared first on SecurityWeek.
As Kelly Benefits’s investigation into a recent data breach progressed, the number of impacted individuals continued to grow.
The post Kelly Benefits Data Breach Impacts 550,000 People appeared first on SecurityWeek.
A vulnerability in the Forminator WordPress plugin allows attackers to delete arbitrary files and take over impacted websites.
The post Forminator WordPress Plugin Vulnerability Exposes 400,000 Websites to Takeover appeared first on SecurityWeek.
Wed Jul 02 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
CISA has informed organizations about critical authentication bypass and remote code execution vulnerabilities in Microsens NMP Web+.
The post Critical Microsens Product Flaws Allow Hackers to Go ‘From Zero to Hero’ appeared first on SecurityWeek.
LevelBlue has announced plans to acquire Trustwave to create the largest pure-play managed security services provider (MSSP).
The post LevelBlue to Acquire Trustwave to Create Major MSSP appeared first on SecurityWeek.
The move could reshape how LLM developers gather information — and force new deals between creators and AI companies.
The post Cloudflare Puts a Default Block on AI Web Scraping appeared first on SecurityWeek.
Esse Health says the personal information of over 263,000 individuals was stolen in an April 2025 cyberattack.
The post 263,000 Impacted by Esse Health Data Breach appeared first on SecurityWeek.
Many Citrix NetScaler systems are exposed to attacks exploiting the vulnerabilities tracked as CVE-2025-5777 and CVE-2025-6543.
The post Thousands of Citrix NetScaler Instances Unpatched Against Exploited Vulnerabilities appeared first on SecurityWeek.
Tue Jul 01 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Founded in 2015, the Tel Aviv based company has now raised more than $1 billion and claims more than 3,500 customers.
The post Cato Networks Raises $359 Million to Expand SASE Business appeared first on SecurityWeek.
NASA needs to perform an agency-wide cybersecurity risk assessment and to complete important cybersecurity tasks for each of its projects.
The post NASA Needs Agency-Wide Cybersecurity Risk Assessment: GAO appeared first on SecurityWeek.
Rachel Tobac is a cyber social engineer. She is skilled at persuading people to do what she wants, rather than what they know they ought to do.
The post Hacker Conversations: Rachel Tobac and the Art of Social Engineering appeared first on SecurityWeek.
Casie Antalis is the new program director of the Joint Cyber Coordination Group at the Cybersecurity and Infrastructure Security Agency.
The post Casie Antalis Appointed to Lead CISA Program appeared first on SecurityWeek.
Vulnerabilities in Airoha Bluetooth SoCs expose headphone and earbud products from multiple vendors to takeover attacks.
The post Airoha Chip Vulnerabilities Expose Headphones to Takeover appeared first on SecurityWeek.
Mon Jun 30 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
After more than 40 years of being set against a very recognizable blue, the updated error message will soon be displayed across a black background.
The post Windows’ Infamous ‘Blue Screen of Death’ Will Soon Turn Black appeared first on SecurityWeek.
Noteworthy stories that might have slipped under the radar: Norwegian dam hacked, AT&T agrees to $177 million data breach settlement, Whole Foods distributor restores systems after attack.
The post In Other News: Norway Dam Hacked, $177M Data Breach Settlement, UNFI Attack Update appeared first on SecurityWeek.
Microsoft is preparing a private preview of new Windows endpoint security platform capabilities to help antimalware vendors create solutions that run outside the kernel.
The post Microsoft to Preview New Windows Endpoint Security Platform After CrowdStrike Outage appeared first on SecurityWeek.
RevEng.ai has raised $4.15 million in seed funding for an AI platform that automatically detects malicious code and vulnerabilities in software.
The post RevEng.ai Raises $4.15 Million to Secure Software Supply Chain appeared first on SecurityWeek.
China-linked Silver Fox hacking group is targeting Chinese users with fake installers carrying a RAT and a rootkit.
The post Chinese Hackers Target Chinese Users With RAT, Rootkit appeared first on SecurityWeek.
Sun Jun 29 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
After more than 40 years of being set against a very recognizable blue, the updated error message will soon be displayed across a black background.
The post Windows’ Infamous ‘Blue Screen of Death’ Will Soon Turn Black appeared first on SecurityWeek.
Noteworthy stories that might have slipped under the radar: Norwegian dam hacked, AT&T agrees to $177 million data breach settlement, Whole Foods distributor restores systems after attack.
The post In Other News: Norway Dam Hacked, $177M Data Breach Settlement, UNFI Attack Update appeared first on SecurityWeek.
Microsoft is preparing a private preview of new Windows endpoint security platform capabilities to help antimalware vendors create solutions that run outside the kernel.
The post Microsoft to Preview New Windows Endpoint Security Platform After CrowdStrike Outage appeared first on SecurityWeek.
RevEng.ai has raised $4.15 million in seed funding for an AI platform that automatically detects malicious code and vulnerabilities in software.
The post RevEng.ai Raises $4.15 Million to Secure Software Supply Chain appeared first on SecurityWeek.
China-linked Silver Fox hacking group is targeting Chinese users with fake installers carrying a RAT and a rootkit.
The post Chinese Hackers Target Chinese Users With RAT, Rootkit appeared first on SecurityWeek.
Sat Jun 28 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
After more than 40 years of being set against a very recognizable blue, the updated error message will soon be displayed across a black background.
The post Windows’ Infamous ‘Blue Screen of Death’ Will Soon Turn Black appeared first on SecurityWeek.
Noteworthy stories that might have slipped under the radar: Norwegian dam hacked, AT&T agrees to $177 million data breach settlement, Whole Foods distributor restores systems after attack.
The post In Other News: Norway Dam Hacked, $177M Data Breach Settlement, UNFI Attack Update appeared first on SecurityWeek.
Microsoft is preparing a private preview of new Windows endpoint security platform capabilities to help antimalware vendors create solutions that run outside the kernel.
The post Microsoft to Preview New Windows Endpoint Security Platform After CrowdStrike Outage appeared first on SecurityWeek.
RevEng.ai has raised $4.15 million in seed funding for an AI platform that automatically detects malicious code and vulnerabilities in software.
The post RevEng.ai Raises $4.15 Million to Secure Software Supply Chain appeared first on SecurityWeek.
China-linked Silver Fox hacking group is targeting Chinese users with fake installers carrying a RAT and a rootkit.
The post Chinese Hackers Target Chinese Users With RAT, Rootkit appeared first on SecurityWeek.
Fri Jun 27 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
The proposal seeks to ban all use of the technology in the U.S. government, with exceptions for use in research and counterterrorism efforts.
The post Bipartisan Bill Aims to Block Chinese AI From Federal Agencies appeared first on SecurityWeek.
Nicholas Michael Kloster has pleaded guilty to computer hacking after targeting at least two organizations.
The post Man Who Hacked Organizations to Advertise Security Services Pleads Guilty appeared first on SecurityWeek.
Bonfy.AI has emerged from stealth mode to help organizations prevent cybersecurity, privacy and compliance risks.
The post Bonfy.AI Raises $9.5 Million for Adaptive Content Security Platform appeared first on SecurityWeek.
CISA is urging federal agencies to patch a recent AMI BMC vulnerability and a half-a-decade-old bug in FortiOS by July 17.
The post CISA Warns AMI BMC Vulnerability Exploited in the Wild appeared first on SecurityWeek.
The personal information of 167,000 individuals was compromised in an October 2024 data breach at Central Kentucky Radiology.
The post Central Kentucky Radiology Data Breach Impacts 167,000 appeared first on SecurityWeek.
Thu Jun 26 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
New research suggests more than 10,000 SaaS apps could remain vulnerable to a nOAuth variant despite the basic issue being disclosed in June 2023.
The post Thousands of SaaS Apps Could Still Be Susceptible to nOAuth appeared first on SecurityWeek.
With end of support scheduled for October 2025, Windows 10 users will be able to continue receiving important security updates.
The post Microsoft Offers Free Windows 10 Extended Security Update Options as EOS Nears appeared first on SecurityWeek.
G Data has observed a surge in malware infections originating from ConnectWise applications with modified certificate tables.
The post Hackers Abuse ConnectWise to Hide Malware appeared first on SecurityWeek.
SonicWall says a modified version of the legitimate NetExtender application contains information-stealing code.
The post SonicWall Warns of Trojanized NetExtender Stealing User Information appeared first on SecurityWeek.
Rapid7 has found several serious vulnerabilities affecting over 700 printer models from Brother and other vendors.
The post New Vulnerabilities Expose Millions of Brother Printers to Hacking appeared first on SecurityWeek.
Wed Jun 25 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Siemens is working with Microsoft to address a Defender Antivirus problem that can lead to no malware alerts or plant disruptions.
The post Siemens Notifies Customers of Microsoft Defender Antivirus Issue appeared first on SecurityWeek.
The future of secure digital engagement depends on continuous identity verification and proofing that can scale with risk.
The post Identity Is the New Perimeter: Why Proofing and Verification Are Business Imperatives appeared first on SecurityWeek.
Palo Alto Networks has observed a spike in Prometei activity since March 2025, pointing to a resurgence of the botnet.
The post Prometei Botnet Activity Spikes appeared first on SecurityWeek.
A Chinese APT has been infecting SOHO routers with the ShortLeash backdoor to build stealthy espionage infrastructure.
The post Chinese APT Hacking Routers to Build Espionage Infrastructure appeared first on SecurityWeek.
Newly discovered spyware has sneaked into Apple’s App Store and Google Play to steal images from users’ mobile devices.
The post Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play appeared first on SecurityWeek.
Tue Jun 24 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
North Korean hackers employ social engineering to trick Zoom Meeting participants into executing system-takeover commands.
The post North Korean Hackers Take Over Victims’ Systems Using Zoom Meeting appeared first on SecurityWeek.
Canada’s Centre for Cyber Security and the FBI warn of Chinese hackers targeting telecommunications and other companies in Canada.
The post China’s Salt Typhoon Hackers Target Canadian Telecom Firms appeared first on SecurityWeek.
New "Echo Chamber" attack bypasses advanced LLM safeguards by subtly manipulating conversational context, proving highly effective across leading AI models.
The post New AI Jailbreak Bypasses Guardrails With Ease appeared first on SecurityWeek.
A critical-severity vulnerability in Teleport could allow remote attackers to bypass SSH authentication and access managed systems.
The post Critical Authentication Bypass Flaw Patched in Teleport appeared first on SecurityWeek.
The personal information of 743,000 individuals was compromised in a 2024 ransomware attack on McLaren Health Care.
The post 743,000 Impacted by McLaren Health Care Data Breach appeared first on SecurityWeek.
Mon Jun 23 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Aflac said that it’s in the early stages of a review of the incident, and so far is unable to determine the total number of affected individuals.
The post Aflac Finds Suspicious Activity on US Network That May Impact Social Security Numbers, Other Data appeared first on SecurityWeek.
Noteworthy stories that might have slipped under the radar: China’s Salt Typhoon targeted Viasat, Washington Post emails compromised in hack, Rowhammer attack named Crowhammer.
The post In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer appeared first on SecurityWeek.
Cloudflare has blocked yet another record-breaking DDoS attack, which delivered the equivalent of 9,000 HD movies in just 45 seconds.
The post Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider appeared first on SecurityWeek.
The Godfather Android trojan uses on-device virtualization to hijack legitimate applications and steal users’ funds.
The post Godfather Android Trojan Creates Sandbox on Infected Devices appeared first on SecurityWeek.
Threat actors are exploiting a critical-severity vulnerability in Motors theme for WordPress to change arbitrary user passwords.
The post Motors Theme Vulnerability Exploited to Hack WordPress Websites appeared first on SecurityWeek.
Sun Jun 22 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Aflac said that it’s in the early stages of a review of the incident, and so far is unable to determine the total number of affected individuals.
The post Aflac Finds Suspicious Activity on US Network That May Impact Social Security Numbers, Other Data appeared first on SecurityWeek.
Noteworthy stories that might have slipped under the radar: China’s Salt Typhoon targeted Viasat, Washington Post emails compromised in hack, Rowhammer attack named Crowhammer.
The post In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer appeared first on SecurityWeek.
Cloudflare has blocked yet another record-breaking DDoS attack, which delivered the equivalent of 9,000 HD movies in just 45 seconds.
The post Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider appeared first on SecurityWeek.
The Godfather Android trojan uses on-device virtualization to hijack legitimate applications and steal users’ funds.
The post Godfather Android Trojan Creates Sandbox on Infected Devices appeared first on SecurityWeek.
Threat actors are exploiting a critical-severity vulnerability in Motors theme for WordPress to change arbitrary user passwords.
The post Motors Theme Vulnerability Exploited to Hack WordPress Websites appeared first on SecurityWeek.
Sat Jun 21 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Noteworthy stories that might have slipped under the radar: China’s Salt Typhoon targeted Viasat, Washington Post emails compromised in hack, Rowhammer attack named Crowhammer.
The post In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer appeared first on SecurityWeek.
Cloudflare has blocked yet another record-breaking DDoS attack, which delivered the equivalent of 9,000 HD movies in just 45 seconds.
The post Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider appeared first on SecurityWeek.
The Godfather Android trojan uses on-device virtualization to hijack legitimate applications and steal users’ funds.
The post Godfather Android Trojan Creates Sandbox on Infected Devices appeared first on SecurityWeek.
Threat actors are exploiting a critical-severity vulnerability in Motors theme for WordPress to change arbitrary user passwords.
The post Motors Theme Vulnerability Exploited to Hack WordPress Websites appeared first on SecurityWeek.
WhatsApp told SecurityWeek that it linked the exploited FreeType vulnerability CVE-2025-27363 to a Paragon exploit.
The post FreeType Zero-Day Found by Meta Exploited in Paragon Spyware Attacks appeared first on SecurityWeek.
Fri Jun 20 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Israel-linked Predatory Sparrow hackers torched more than $90 million at Iran’s largest cryptobank as Israel-Iran cyberwar escalates.
The post Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War appeared first on SecurityWeek.
Trend Micro and ReversingLabs uncovered over 100 GitHub accounts distributing malware embedded in open source hacking tools.
The post New Campaigns Distribute Malware via Open Source Hacking Tools appeared first on SecurityWeek.
A ransomware group has claimed the theft of millions of files from procurement service provider Chain IQ and 19 other companies.
The post Chain IQ, UBS Data Stolen in Ransomware Attack appeared first on SecurityWeek.
After decades of failed attempts to access encrypted communications, governments are shifting from persuasion to coercion—security experts say the risks are too high.
The post Encryption Backdoors: The Security Practitioners’ View appeared first on SecurityWeek.
Krispy Kreme is sending notifications to thousands of people impacted by the data breach that came to light at the end of 2024.
The post Krispy Kreme Confirms Data Breach After Ransomware Attack appeared first on SecurityWeek.
Thu Jun 19 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Russian hackers posed as US State Department staff and convinced targets to generate and give up Google app-specific passwords.
The post Russian Hackers Bypass Gmail MFA With App-Specific Password Ruse appeared first on SecurityWeek.
Misconfigured permissions in Google’s Gerrit code collaboration platform could have led to the compromise of ChromiumOS and other Google projects.
The post Gerrit Misconfiguration Exposed Google Projects to Malicious Code Injection appeared first on SecurityWeek.
Citrix has released patches for critical- and high-severity vulnerabilities in NetScaler and Secure Access Client and Workspace for Windows.
The post Critical Vulnerability Patched in Citrix NetScaler appeared first on SecurityWeek.
Qualys has disclosed two Linux vulnerabilities that can be chained for full root access, and CISA added a flaw to its KEV catalog.
The post Linux Security: New Flaws Allow Root Access, CISA Warns of Old Bug Exploitation appeared first on SecurityWeek.
Adopting a layered defense strategy that includes human-centric tools and updating security components.
The post Mitigating AI Threats: Bridging the Gap Between AI and Legacy Security appeared first on SecurityWeek.
Wed Jun 18 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Researchers identify a previously unknown ClickFix variant exploiting PowerShell and clipboard hijacking to deliver the Lumma infostealer via a compromised travel site.
The post New ClickFix Malware Variant ‘LightPerlGirl’ Targets Users in Stealthy Hack appeared first on SecurityWeek.
GreyNoise warns of a spike in exploitation attempts targeting a two-year-old vulnerability in Zyxel firewalls.
The post Zyxel Firewall Vulnerability Again in Attacker Crosshairs appeared first on SecurityWeek.
Google is warning insurance companies that Scattered Spider appears to have shifted its focus from the retail sector.
The post US Insurance Industry Warned of Scattered Spider Attacks appeared first on SecurityWeek.
Cloud security startup Circumvent has raised $6 million to develop a network of agents for autonomous prioritization and remediation.
The post Circumvent Raises $6 Million for Cloud Security Platform appeared first on SecurityWeek.
CISA warns that a vulnerability impacting multiple discontinued TP-Link router models is exploited in the wild.
The post Organizations Warned of Vulnerability Exploited Against Discontinued TP-Link Routers appeared first on SecurityWeek.
Tue Jun 17 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
According to reports, the US Department of Justice will assess whether the deal would harm competition in the cybersecurity market.
The post Google’s $32 Billion Wiz Deal Draws DOJ Antitrust Scrutiny: Report appeared first on SecurityWeek.
The Archetyp Market drug marketplace has been targeted by law enforcement in an operation involving takedowns and arrests.
The post Archetyp Dark Web Market Shut Down by Law Enforcement appeared first on SecurityWeek.
Asheville Eye Associates says the personal information of 147,000 individuals was stolen in a November 2024 data breach.
The post Asheville Eye Associates Says 147,000 Impacted by Data Breach appeared first on SecurityWeek.
The Indian car sharing marketplace Zoomcar learned that its systems were hacked after a threat actor contacted employees.
The post Zoomcar Says Hackers Accessed Data of 8.4 Million Users appeared first on SecurityWeek.
The KillSec ransomware group has stolen hundreds of gigabytes of data from Ireland-based eyecare technology company Ocuco.
The post 240,000 Impacted by Data Breach at Eyecare Tech Firm Ocuco appeared first on SecurityWeek.
Mon Jun 16 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Noteworthy stories that might have slipped under the radar: Cloudflare outage not caused by cyberattack, Dutch police identified 126 users of Cracked.io, the Victoria’s Secret cyberattack has cost $10 million.
The post In Other News: Cloudflare Outage, Cracked.io Users Identified, Victoria’s Secret Cyberattack Cost appeared first on SecurityWeek.
Threat actors have abused the TeamFiltration pentesting framework to target over 80,000 Entra ID user accounts.
The post TeamFiltration Abused in Entra ID Account Takeover Campaign appeared first on SecurityWeek.
Industry professionals comment on the Trump administration’s new executive order on cybersecurity.
The post Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday appeared first on SecurityWeek.
CISA warns that vulnerable SimpleHelp RMM instances have been exploited against a utility billing software provider’s customers.
The post SimpleHelp Vulnerability Exploited Against Utility Billing Software Users appeared first on SecurityWeek.
Multiple legitimate, unusual tools were used in a Fog ransomware attack, including one employed by Chinese hacking group APT41.
The post Fog Ransomware Attack Employs Unusual Tools appeared first on SecurityWeek.
Sun Jun 15 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Noteworthy stories that might have slipped under the radar: Cloudflare outage not caused by cyberattack, Dutch police identified 126 users of Cracked.io, the Victoria’s Secret cyberattack has cost $10 million.
The post In Other News: Cloudflare Outage, Cracked.io Users Identified, Victoria’s Secret Cyberattack Cost appeared first on SecurityWeek.
Threat actors have abused the TeamFiltration pentesting framework to target over 80,000 Entra ID user accounts.
The post TeamFiltration Abused in Entra ID Account Takeover Campaign appeared first on SecurityWeek.
Industry professionals comment on the Trump administration’s new executive order on cybersecurity.
The post Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday appeared first on SecurityWeek.
CISA warns that vulnerable SimpleHelp RMM instances have been exploited against a utility billing software provider’s customers.
The post SimpleHelp Vulnerability Exploited Against Utility Billing Software Users appeared first on SecurityWeek.
Multiple legitimate, unusual tools were used in a Fog ransomware attack, including one employed by Chinese hacking group APT41.
The post Fog Ransomware Attack Employs Unusual Tools appeared first on SecurityWeek.
Sat Jun 14 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Noteworthy stories that might have slipped under the radar: Cloudflare outage not caused by cyberattack, Dutch police identified 126 users of Cracked.io, the Victoria’s Secret cyberattack has cost $10 million.
The post In Other News: Cloudflare Outage, Cracked.io Users Identified, Victoria’s Secret Cyberattack Cost appeared first on SecurityWeek.
Threat actors have abused the TeamFiltration pentesting framework to target over 80,000 Entra ID user accounts.
The post TeamFiltration Abused in Entra ID Account Takeover Campaign appeared first on SecurityWeek.
Industry professionals comment on the Trump administration’s new executive order on cybersecurity.
The post Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday appeared first on SecurityWeek.
CISA warns that vulnerable SimpleHelp RMM instances have been exploited against a utility billing software provider’s customers.
The post SimpleHelp Vulnerability Exploited Against Utility Billing Software Users appeared first on SecurityWeek.
Multiple legitimate, unusual tools were used in a Fog ransomware attack, including one employed by Chinese hacking group APT41.
The post Fog Ransomware Attack Employs Unusual Tools appeared first on SecurityWeek.
Fri Jun 13 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Citizen Lab publishes forensic proof that spyware maker Paragon can compromise up-to-date iPhones. Journalists in Europe among victims.
The post Paragon ‘Graphite’ Spyware Linked to Zero-Click Hacks on Newest iPhones appeared first on SecurityWeek.
AI-generated voice deepfakes have crossed the uncanny valley, fueling a surge in fraud that outpaces traditional security measures. Detection technology is racing to keep up.
The post The AI Arms Race: Deepfake Generation vs. Detection appeared first on SecurityWeek.
Hirundo tackles AI hallucinations and bias by making trained models “forget” poisoned, malicious, and confidential data.
The post Hirundo Raises $8 Million to Eliminate AI’s Bad Behavior appeared first on SecurityWeek.
The new attack technique uses smartwatches to capture ultrasonic covert communication in air-gapped environments and exfiltrate data.
The post New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches appeared first on SecurityWeek.
Learn how attackers hide in plain sight—and what you can do to stop them without slowing down your business.
The post Webcast Video: Rethinking Endpoint Hardening for Today’s Attack Landscape appeared first on SecurityWeek.
Thu Jun 12 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Beyond potentially halting sales of physical goods, breaches can expose customers’ personal data to future phishing or fraud attempts.
The post With Retail Cyberattacks on the Rise, Customers Find Orders Blocked and Shelves Empty appeared first on SecurityWeek.
Cybersecurity heavyweight Securonix acquires ThreatQuotient to boost plans to build an all-in-one security operations stack.
The post Securonix Acquires Threat Intelligence Firm ThreatQuotient appeared first on SecurityWeek.
Maze and its investors are betting on finding profits in software that uses AI-powered agents to automate critical parts of the process.
The post Maze Banks $25M to Tackle Cloud Security With AI Agents appeared first on SecurityWeek.
Vulnerable DTResearch UEFI firmware applications can be used in BYOVD attacks to bypass Secure Boot.
The post Flaw in Industrial Computer Maker’s UEFI Apps Enables Secure Boot Bypass on Many Devices appeared first on SecurityWeek.
Learn how attackers hide in plain sight—and what you can do to stop them without slowing down your business.
The post Webinar Today: Rethinking Endpoint Hardening for Today’s Attack Landscape appeared first on SecurityWeek.
Wed Jun 11 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Fake college enrollments have been surging as crime rings deploy “ghost students” — chatbots that join online classrooms and stay just long enough to collect a financial aid check.
The post How Scammers Are Using AI to Steal College Financial Aid appeared first on SecurityWeek.
Patch Tuesday: Adobe documents hundreds of bugs across multiple products and warns of code execution, feature bypass risks.
The post Code Execution Flaws Haunt Adobe Acrobat Reader, Adobe Commerce appeared first on SecurityWeek.
Redmond warns that external control of a file name or path in WebDAV "allows an unauthorized attacker to execute code over a network."
The post Microsoft Patch Tuesday Covers WebDAV Flaw Marked as ‘Already Exploited’ appeared first on SecurityWeek.
The Texas Department of Transportation has disclosed a data breach impacting the personal information included in 300,000 crash reports.
The post Hackers Stole 300,000 Crash Reports From Texas Department of Transportation appeared first on SecurityWeek.
Swimlane has raised $45 million in a growth funding round to fuel its global channel expansion and product innovation.
The post Swimlane Raises $45 Million for Security Automation Platform appeared first on SecurityWeek.
Tue Jun 10 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Foreign hackers have increasingly identified smartphones, other mobile devices and the apps they use as a weak link in U.S. cyberdefenses.
The post Chinese Hackers and User Lapses Turn Smartphones Into a ‘Mobile Security Crisis’ appeared first on SecurityWeek.
Anti-malware vendor said it spent the past twelve months deflecting a stream of network reconnaissance probes from China-nexus threat actors
The post Chinese Espionage Crews Circle SentinelOne in Year-Long Reconnaissance Campaign appeared first on SecurityWeek.
The Israeli company said the Series B raise was led by ClearSky and included equity stakes for new backer Phoenix Financial.
The post Guardz Banks $56M Series B for All-in-One SMB Security appeared first on SecurityWeek.
CVE-2025-24016, a critical remote code execution vulnerability affecting Wazuh servers, has been exploited by Mirai botnets.
The post Mirai Botnets Exploiting Wazuh Security Platform Vulnerability appeared first on SecurityWeek.
A threat actor published backdoored versions of 17 NPM packages from GlueStack in a fresh supply chain attack.
The post React Native Aria Packages Backdoored in Supply Chain Attack appeared first on SecurityWeek.
Mon Jun 09 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Noteworthy stories that might have slipped under the radar: FBI issues an alert on BadBox 2 botnet, NSO disputing the $168 million WhatsApp fine, 1,000 people left CISA since Trump took office.
The post In Other News: FBI Warns of BadBox 2, NSO Disputes WhatsApp Fine, 1,000 Leave CISA appeared first on SecurityWeek.
The number of cybersecurity-related merger and acquisition (M&A) announcements surged in May 2025.
The post Cybersecurity M&A Roundup: 42 Deals Announced in May 2025 appeared first on SecurityWeek.
Data security firm MIND has raised $30 million in Series A funding to expand its R&D and go-to-market teams.
The post MIND Raises $30 Million for Data Loss Prevention appeared first on SecurityWeek.
A Russia-linked threat actor has used the destructive malware dubbed PathWiper against a critical infrastructure organization in Ukraine.
The post Destructive ‘PathWiper’ Targeting Ukraine’s Critical Infrastructure appeared first on SecurityWeek.
Cisco has released patches for a critical vulnerability impacting cloud deployments of Identity Services Engine (ISE).
The post Cisco Patches Critical ISE Vulnerability With Public PoC appeared first on SecurityWeek.
Sun Jun 08 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Noteworthy stories that might have slipped under the radar: FBI issues an alert on BadBox 2 botnet, NSO disputing the $168 million WhatsApp fine, 1,000 people left CISA since Trump took office.
The post In Other News: FBI Warns of BadBox 2, NSO Disputes WhatsApp Fine, 1,000 Leave CISA appeared first on SecurityWeek.
The number of cybersecurity-related merger and acquisition (M&A) announcements surged in May 2025.
The post Cybersecurity M&A Roundup: 42 Deals Announced in May 2025 appeared first on SecurityWeek.
Data security firm MIND has raised $30 million in Series A funding to expand its R&D and go-to-market teams.
The post MIND Raises $30 Million for Data Loss Prevention appeared first on SecurityWeek.
A Russia-linked threat actor has used the destructive malware dubbed PathWiper against a critical infrastructure organization in Ukraine.
The post Destructive ‘PathWiper’ Targeting Ukraine’s Critical Infrastructure appeared first on SecurityWeek.
Cisco has released patches for a critical vulnerability impacting cloud deployments of Identity Services Engine (ISE).
The post Cisco Patches Critical ISE Vulnerability With Public PoC appeared first on SecurityWeek.
Sat Jun 07 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Noteworthy stories that might have slipped under the radar: FBI issues an alert on BadBox 2 botnet, NSO disputing the $168 million WhatsApp fine, 1,000 people left CISA since Trump took office.
The post In Other News: FBI Warns of BadBox 2, NSO Disputes WhatsApp Fine, 1,000 Leave CISA appeared first on SecurityWeek.
The number of cybersecurity-related merger and acquisition (M&A) announcements surged in May 2025.
The post Cybersecurity M&A Roundup: 42 Deals Announced in May 2025 appeared first on SecurityWeek.
Data security firm MIND has raised $30 million in Series A funding to expand its R&D and go-to-market teams.
The post MIND Raises $30 Million for Data Loss Prevention appeared first on SecurityWeek.
A Russia-linked threat actor has used the destructive malware dubbed PathWiper against a critical infrastructure organization in Ukraine.
The post Destructive ‘PathWiper’ Targeting Ukraine’s Critical Infrastructure appeared first on SecurityWeek.
Cisco has released patches for a critical vulnerability impacting cloud deployments of Identity Services Engine (ISE).
The post Cisco Patches Critical ISE Vulnerability With Public PoC appeared first on SecurityWeek.
Fri Jun 06 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Censys researchers follow some clues and find hundreds of control-room dashboards for US water utilities on the public internet.
The post Misconfigured HMIs Expose US Water Systems to Anyone With a Browser appeared first on SecurityWeek.
A threat actor has been creating backdoored open source malware repositories to target novice cybercriminals and game cheaters.
The post Backdoored Open Source Malware Repositories Target Novice Cybercriminals appeared first on SecurityWeek.
Cellebrite and Corellium, whose names have been mentioned in spyware stories, are joining forces to provide advanced investigative solutions.
The post Controversial Firms Cellebrite and Corellium Announce $200 Million Acquisition Deal appeared first on SecurityWeek.
Sagar Steven Singh and Nicholas Ceraolo, members of the Vile group, get prison sentences for identity theft and hacking.
The post Men Who Hacked Law Enforcement Database for Doxing Sentenced to Prison appeared first on SecurityWeek.
Researchers have discovered and analyzed a ClickFix attack that uses a fake Cloudflare ‘humanness’ check.
The post ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware appeared first on SecurityWeek.
Thu Jun 05 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
A financially motivated threat actor employing vishing to compromise Salesforce customers, and extort them.
The post Google Warns of Vishing, Extortion Campaign Targeting Salesforce Customers appeared first on SecurityWeek.
AI is transforming the cybersecurity landscape—empowering attackers with powerful new tools while offering defenders a chance to fight back. But without stronger awareness and strategy, organizations risk falling behind.
The post Going Into the Deep End: Social Engineering and the AI Flood appeared first on SecurityWeek.
Compyl has raised $12 million in a Series A funding round that will be invested in go-to-market initiatives, hirings, and GRC platform expansion.
The post Compyl Raises $12 Million for GRC Platform appeared first on SecurityWeek.
Industrial giant Honeywell has published its 2025 Cybersecurity Threat Report with information on the latest trends.
The post Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift appeared first on SecurityWeek.
Learn why your security controls matter more than theoretical risk scores and how exposure validation helps slash massive patch lists down to the few vulnerabilities that truly demand action.
The post Webinar Today: Redefining Vulnerability Management With Exposure Validation appeared first on SecurityWeek.
Wed Jun 04 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Trustifi has raised $25 million in Series A funding to accelerate its product roadmap and go-to-market initiatives.
The post Trustifi Raises $25 Million for AI-Powered Email Security appeared first on SecurityWeek.
The UK’s 2025 Strategic Defence Review outlines a unified approach to modern warfare, integrating cyber, AI, and electromagnetic capabilities across military domains.
The post The UK Brings Cyberwarfare Out of the Closet appeared first on SecurityWeek.
Mikko Hypponen has joined the Finnish anti-drone company Sensofusion as Chief Research Officer after three decades of fighting malware.
The post Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones appeared first on SecurityWeek.
With crime-as-a-service lowering the barrier to entry and prosecution lagging behind, enterprise security teams must rethink their strategies to detect and disrupt scams at scale.
The post Why Scamming Can’t Be Stopped—But It Can Be Managed appeared first on SecurityWeek.
A critical command execution vulnerability has been found by a researcher in Instantel Micromate monitoring units.
The post 1,000 Instantel Industrial Monitoring Devices Possibly Exposed to Hacking appeared first on SecurityWeek.
Tue Jun 03 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Luxury brand Cartier disclosed a data breach in which an unauthorized party gained access to its systems and obtained some client information.
The post Cartier Data Breach: Luxury Retailer Warns Customers that Personal Data Was Exposed appeared first on SecurityWeek.
Cryptocurrency mining operation hits exposed Consul dashboards, Docker Engine APIs and Gitea code-hosting instances to push Monero miner.
The post Cryptojackers Caught Mining Monero via Exposed DevOps Infrastructure appeared first on SecurityWeek.
Chipmaker says there are indications from Google Threat Analysis Group that a trio of flaws “may be under limited, targeted exploitation.”
The post Qualcomm Flags Exploitation of Adreno GPU Flaws, Urges OEMs to Patch Urgently appeared first on SecurityWeek.
Exploitation of the vBulletin vulnerability tracked as CVE-2025-48827 and CVE-2025-48828 started shortly after disclosure.
The post vBulletin Vulnerability Exploited in the Wild appeared first on SecurityWeek.
Patterns of concerning behavior led Google to remove trust in certificates from Chunghwa Telecom and Netlock from Chrome.
The post Chrome to Distrust Chunghwa Telecom and Netlock Certificates appeared first on SecurityWeek.
Mon Jun 02 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Security researchers flag two phishing campaigns abusing Firebase and Google Apps Script to host malware and fake login pages.
The post Firebase, Google Apps Script Abused in Fresh Phishing Campaigns appeared first on SecurityWeek.
The US Treasury Department US has slapped sanctions on Funnull Technology for providing support to cryptocurrency investment scams.
The post US Sanctions Philippine Company for Supporting Crypto Scams appeared first on SecurityWeek.
Join the live webinar to understand why data in itself is not enough to make informed decisions for prioritization.
The post Watch Now: Why Context is a Secret Weapon in Application Security Posture Management appeared first on SecurityWeek.
China-linked hackers used a compromised government site to target other government entities with the ToughProgress malware that uses an attacker-controlled Google Calendar for C&C.
The post Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments appeared first on SecurityWeek.
The roadmap provides an overview of four key stages of the migration process, namely preparation, baseline understanding, planning and execution, and monitoring and evaluation.
The post MITRE Publishes Post-Quantum Cryptography Migration Roadmap appeared first on SecurityWeek.
Sun Jun 01 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Security researchers flag two phishing campaigns abusing Firebase and Google Apps Script to host malware and fake login pages.
The post Firebase, Google Apps Script Abused in Fresh Phishing Campaigns appeared first on SecurityWeek.
The US Treasury Department US has slapped sanctions on Funnull Technology for providing support to cryptocurrency investment scams.
The post US Sanctions Philippine Company for Supporting Crypto Scams appeared first on SecurityWeek.
Join the live webinar to understand why data in itself is not enough to make informed decisions for prioritization.
The post Watch Now: Why Context is a Secret Weapon in Application Security Posture Management appeared first on SecurityWeek.
China-linked hackers used a compromised government site to target other government entities with the ToughProgress malware that uses an attacker-controlled Google Calendar for C&C.
The post Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments appeared first on SecurityWeek.
The roadmap provides an overview of four key stages of the migration process, namely preparation, baseline understanding, planning and execution, and monitoring and evaluation.
The post MITRE Publishes Post-Quantum Cryptography Migration Roadmap appeared first on SecurityWeek.
Sat May 31 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Security researchers flag two phishing campaigns abusing Firebase and Google Apps Script to host malware and fake login pages.
The post Firebase, Google Apps Script Abused in Fresh Phishing Campaigns appeared first on SecurityWeek.
The US Treasury Department US has slapped sanctions on Funnull Technology for providing support to cryptocurrency investment scams.
The post US Sanctions Philippine Company for Supporting Crypto Scams appeared first on SecurityWeek.
Join the live webinar to understand why data in itself is not enough to make informed decisions for prioritization.
The post Watch Now: Why Context is a Secret Weapon in Application Security Posture Management appeared first on SecurityWeek.
China-linked hackers used a compromised government site to target other government entities with the ToughProgress malware that uses an attacker-controlled Google Calendar for C&C.
The post Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments appeared first on SecurityWeek.
The roadmap provides an overview of four key stages of the migration process, namely preparation, baseline understanding, planning and execution, and monitoring and evaluation.
The post MITRE Publishes Post-Quantum Cryptography Migration Roadmap appeared first on SecurityWeek.
Fri May 30 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Active since at least 2023, the hacking group has been targeting the financial, government, IT, logistics, retail, and education sectors.
The post Chinese Hacking Group ‘Earth Lamia’ Targets Multiple Industries appeared first on SecurityWeek.
Security startup Unbound has raised $4 million in funding to help organizations adopt generative-AI tools securely and responsibly.
The post Unbound Raises $4 Million to Secure Gen-AI Adoption appeared first on SecurityWeek.
Professional hackers have built a network of ASUS routers that can survive firmware upgrades, factory reboots and most anti-malware scans.
The post GreyNoise Flags 9,000 ASUS Routers Backdoored Via Patched Vulnerability appeared first on SecurityWeek.
Website remains offline following suspected cyber incident, as experts warn of escalating threats targeting major retailers
The post Victoria’s Secret Website Taken Offline After Cyberattack appeared first on SecurityWeek.
Adidas said hackers accessed a “third-party customer service provider” and stole customer information.
The post Adidas Data Breach Linked to Third-Party Vendor appeared first on SecurityWeek.
Thu May 29 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Website remains offline following suspected cyber incident, as experts warn of escalating threats targeting major retailers
The post Victoria’s Secret Website Taken Offline After Cyberattack appeared first on SecurityWeek.
Adidas said hackers accessed a “third-party customer service provider” and stole customer information.
The post Adidas Data Breach Linked to Third-Party Vendor appeared first on SecurityWeek.
Join the live webinar to understand why data in itself is not enough to make informed decisions for prioritization.
The post Webinar Today: Why Context is a Secret Weapon in Application Security Posture Management appeared first on SecurityWeek.
Agentic AI can be a great tool for many of the ‘gray area’ tasks that SOC analysts undertake.
The post Beyond GenAI: Why Agentic AI Was the Real Conversation at RSA 2025 appeared first on SecurityWeek.
The incident impacted multiple web and mobile applications, licensing services, downloads and online store, website, wiki, MathWorks accounts, and other services.
The post MATLAB Maker MathWorks Recovering From Ransomware Attack appeared first on SecurityWeek.
Wed May 28 2025 00:00:00 GMT+0000 (Coordinated Universal Time)
Zscaler signals a big push into the security-operations market with the announcement of plans to buy Denver-based Red Canary.
The post Zscaler to Acquire MDR Specialist Red Canary appeared first on SecurityWeek.
Sina Gholinejad pleaded guilty to computer-fraud and wire-fraud-conspiracy charges linked to the Robbinhood ransomware hit on Baltimore.
The post Iranian Man Pleads Guilty to Role in Baltimore Ransomware Attack appeared first on SecurityWeek.
Sophos warns that a DragonForce ransomware operator chained three vulnerabilities in SimpleHelp to target a managed service provider.
The post DragonForce Ransomware Hackers Exploiting SimpleHelp Vulnerabilities appeared first on SecurityWeek.
Microsoft flags a new Kremlin hacking team buying stolen usernames and passwords from infostealer markets for use in cyberespionage attacks.
The post Russian Government Hackers Caught Buying Passwords from Cybercriminals appeared first on SecurityWeek.
Security firm Socket warns flags a campaign targeting NPM users with tens of malicious packages that can hijack system information.
The post Ongoing Campaign Uses 60 NPM Packages to Steal Data appeared first on SecurityWeek.