2025 was the strongest year for cybersecurity funding since the 2021 peak, according to Pinpoint Search Group. The post Cybersecurity Firms Secured $14 Billion in Funding in 2025: Analysis appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Category: securityweek
Several Code Execution Flaws Patched in Veeam Backup & Replication
Four vulnerabilities have been fixed in the latest release of Veeam Backup & Replication. The post Several Code Execution Flaws Patched in Veeam Backup & Replication appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Hackers Exploit Zero-Day in Discontinued D-Link Devices
The critical-severity vulnerability allows unauthenticated, remote attackers to execute arbitrary shell commands. The post Hackers Exploit Zero-Day in Discontinued D-Link Devices appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Hackers Exploit Zero-Day in…
Cybersecurity Firms Secured $14 Billion in Funding in 2025
2025 was the strongest year for cybersecurity funding since the 2021 peak, according to Pinpoint Search Group. The post Cybersecurity Firms Secured $14 Billion in Funding in 2025 appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Complex Routing, Misconfigurations Exploited for Domain Spoofing in Phishing Attacks
Threat actors spoof legitimate domains to make their phishing emails appear to have been sent internally. The post Complex Routing, Misconfigurations Exploited for Domain Spoofing in Phishing Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Cyber Risk Trends for 2026: Building Resilience, Not Just Defenses
We can’t outpace the adversary by trying to stop every attack, but we can outlast them by engineering systems and culture to take a punch and try to quickly rebound. The post Cyber Risk Trends for 2026: Building Resilience, Not…
Hacker Conversations: Katie Paxton-Fear Talks Autism, Morality and Hacking
From dismantling online games as a child to uncovering real-world vulnerabilities, Katie Paxton-Fear explains how autism, curiosity, and a rejection of ambiguity shaped her path into ethical hacking. The post Hacker Conversations: Katie Paxton-Fear Talks Autism, Morality and Hacking appeared…
Researchers Trap Scattered Lapsus$ Hunters in Honeypot
Using fake accounts and synthetic data to lure the hackers, the researchers gathered information on their servers. The post Researchers Trap Scattered Lapsus$ Hunters in Honeypot appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Critical Dolby Vulnerability Patched in Android
The flaw is tracked as CVE-2025-54957 and its existence came to light in October 2025 after it was discovered by Google researchers. The post Critical Dolby Vulnerability Patched in Android appeared first on SecurityWeek. This article has been indexed from…
Sophisticated ClickFix Campaign Targeting Hospitality Sector
Fake Booking reservation cancellations and fake BSODs trick victims into executing malicious code leading to RAT infections. The post Sophisticated ClickFix Campaign Targeting Hospitality Sector appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
Dozens of Major Data Breaches Linked to Single Threat Actor
The initial access broker (IAB) relies on credentials exfiltrated using information stealers to hack organizations. The post Dozens of Major Data Breaches Linked to Single Threat Actor appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
NordVPN Denies Breach After Hacker Leaks Data
The VPN company has conducted an investigation after a threat actor claimed to have hacked its systems. The post NordVPN Denies Breach After Hacker Leaks Data appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Cybersecurity M&A Roundup: 30 Deals Announced in December 2025
Significant cybersecurity M&A deals announced by Akamai, Red Hat, Checkmarx, Silent Push, and ServiceNow. The post Cybersecurity M&A Roundup: 30 Deals Announced in December 2025 appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
Brightspeed Investigating Cyberattack
The hacking group Crimson Collective has claimed the theft of personal information pertaining to over 1 million Brightspeed customers. The post Brightspeed Investigating Cyberattack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Brightspeed…
Cyberattack Unlikely in Communications Failure That Grounded Flights in Greece
Flights across Greece were impacted for several hours after noise was reported on multiple air traffic communication channels. The post Cyberattack Unlikely in Communications Failure That Grounded Flights in Greece appeared first on SecurityWeek. This article has been indexed from…
Sedgwick Confirms Cyberattack on Government Subsidiary
Hackers have compromised a file transfer system at Sedgwick’s subsidiary that serves government agencies. The post Sedgwick Confirms Cyberattack on Government Subsidiary appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Sedgwick Confirms Cyberattack…
CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 Entries
With 24 new vulnerabilities known to be exploited by ransomware groups, the list now includes 1,484 software and hardware flaws. The post CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 Entries appeared first on SecurityWeek. This article has been…
Kimwolf Android Botnet Grows Through Residential Proxy Networks
The 2-million-device-strong botnet allows monetization through DDoS attacks, app installs, and the selling of proxy bandwidth. The post Kimwolf Android Botnet Grows Through Residential Proxy Networks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Researcher Spotlights WhatsApp Metadata Leak as Meta Begins Rolling Out Fixes
WhatsApp device fingerprinting can be useful in the delivery of sophisticated spyware, but impact is very limited without a zero-day. The post Researcher Spotlights WhatsApp Metadata Leak as Meta Begins Rolling Out Fixes appeared first on SecurityWeek. This article has…
President Trump Orders Divestment in $2.9 Million Chips Deal to Protect US Security Interests
The deal involved aerospace and defense specialist Emcore Corp. selling its computer chips and wafer fabrication operation. The post President Trump Orders Divestment in $2.9 Million Chips Deal to Protect US Security Interests appeared first on SecurityWeek. This article has…