Category: securityweek

Code Execution Vulnerability Patched in GitHub Enterprise Server

A high-severity vulnerability in GitHub Enterprise Server could have allowed remote attackers to execute arbitrary code. The post Code Execution Vulnerability Patched in GitHub Enterprise Server appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Why Sincerity Is a Strategic Asset in Cybersecurity

Strong security doesn’t just rely on tools—it starts with trust, clarity, and sincerity from the top down. The post Why Sincerity Is a Strategic Asset in Cybersecurity appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Chrome 138, Firefox 140 Patch Multiple Vulnerabilities

Chrome 138 and Firefox 140 are rolling out with fixes for two dozen vulnerabilities, including high-severity memory safety issues. The post Chrome 138, Firefox 140 Patch Multiple Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Russian APT Hits Ukrainian Government With New Malware via Signal

Russia-linked APT28 deployed new malware against Ukrainian government targets through malicious documents sent via Signal chats. The post Russian APT Hits Ukrainian Government With New Malware via Signal appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Siemens Notifies Customers of Microsoft Defender Antivirus Issue

Siemens is working with Microsoft to address a Defender Antivirus problem that can lead to no malware alerts or plant disruptions. The post Siemens Notifies Customers of Microsoft Defender Antivirus Issue appeared first on SecurityWeek. This article has been indexed…

Prometei Botnet Activity Spikes

Palo Alto Networks has observed a spike in Prometei activity since March 2025, pointing to a resurgence of the botnet. The post Prometei Botnet Activity Spikes appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play

Newly discovered spyware has sneaked into Apple’s App Store and Google Play to steal images from users’ mobile devices. The post Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play appeared first on SecurityWeek. This article has been indexed from…

Chinese APT Hacking Routers to Build Espionage Infrastructure

A Chinese APT has been infecting SOHO routers with the ShortLeash backdoor to build stealthy espionage infrastructure. The post Chinese APT Hacking Routers to Build Espionage Infrastructure appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Apple, Netflix, Microsoft Sites ‘Hacked’ for Tech Support Scams

Tech support scammers are using sponsored ads and search parameter injection to trick users into calling them. The post Apple, Netflix, Microsoft Sites ‘Hacked’ for Tech Support Scams  appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

North Korean Hackers Take Over Victims’ Systems Using Zoom Meeting

North Korean hackers employ social engineering to trick Zoom Meeting participants into executing system-takeover commands. The post North Korean Hackers Take Over Victims’ Systems Using Zoom Meeting appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

China’s Salt Typhoon Hackers Target Canadian Telecom Firms

Canada’s Centre for Cyber Security and the FBI warn of Chinese hackers targeting telecommunications and other companies in Canada. The post China’s Salt Typhoon Hackers Target Canadian Telecom Firms appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

New AI Jailbreak Bypasses Guardrails With Ease

New “Echo Chamber” attack bypasses advanced LLM safeguards by subtly manipulating conversational context, proving highly effective across leading AI models. The post New AI Jailbreak Bypasses Guardrails With Ease appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

US Braces for Cyberattacks After Bombing Iranian Nuclear Sites

Iranian hackers are expected to intensify cyberattacks against the US after the recent air strikes on Iran’s nuclear sites. The post US Braces for Cyberattacks After Bombing Iranian Nuclear Sites appeared first on SecurityWeek. This article has been indexed from…

743,000 Impacted by McLaren Health Care Data Breach

The personal information of 743,000 individuals was compromised in a 2024 ransomware attack on McLaren Health Care. The post 743,000 Impacted by McLaren Health Care Data Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Critical Authentication Bypass Flaw Patched in Teleport

A critical-severity vulnerability in Teleport could allow remote attackers to bypass SSH authentication and access managed systems. The post Critical Authentication Bypass Flaw Patched in Teleport appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

US Braces for Cyberattacks After Joining Israel-Iran War

Iranian hackers are expected to intensify cyberattacks against the US after the recent air strikes on Iran’s nuclear sites. The post US Braces for Cyberattacks After Joining Israel-Iran War appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Steelmaker Nucor Says Hackers Stole Data in Recent Attack

Nucor has shared an update on the impact of the recent cyberattack and confirmed that some data has been taken from its IT systems. The post Steelmaker Nucor Says Hackers Stole Data in Recent Attack appeared first on SecurityWeek. This…

Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider

Cloudflare has blocked yet another record-breaking DDoS attack, which delivered the equivalent of 9,000 HD movies in just 45 seconds. The post Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider appeared first on SecurityWeek. This article has been indexed from…

Godfather Android Trojan Creates Sandbox on Infected Devices

The Godfather Android trojan uses on-device virtualization to hijack legitimate applications and steal users’ funds. The post Godfather Android Trojan Creates Sandbox on Infected Devices appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Motors Theme Vulnerability Exploited to Hack WordPress Websites

Threat actors are exploiting a critical-severity vulnerability in Motors theme for WordPress to change arbitrary user passwords. The post Motors Theme Vulnerability Exploited to Hack WordPress Websites appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

FreeType Zero-Day Found by Meta Exploited in Paragon Spyware Attacks

WhatsApp told SecurityWeek that it linked the exploited FreeType vulnerability CVE-2025-27363 to a Paragon exploit. The post FreeType Zero-Day Found by Meta Exploited in Paragon Spyware Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Cloudflare Tunnels Abused in New Malware Campaign

A threat actor is abusing Cloudflare Tunnels for the delivery of a Python loader as part of a complex infection chain. The post Cloudflare Tunnels Abused in New Malware Campaign appeared first on SecurityWeek. This article has been indexed from…

161,000 People Impacted by Krispy Kreme Data Breach

Krispy Kreme is sharing more information on the data breach resulting from the ransomware attack targeting the company in 2024.  The post 161,000 People Impacted by Krispy Kreme Data Breach appeared first on SecurityWeek. This article has been indexed from…

Hackers Access Legacy Systems in Oxford City Council Cyberattack

Personal data of former and current council workers, including election staff, may have been accessed by hackers. The post Hackers Access Legacy Systems in Oxford City Council Cyberattack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

New Campaigns Distribute Malware via Open Source Hacking Tools

Trend Micro and ReversingLabs uncovered over 100 GitHub accounts distributing malware embedded in open source hacking tools. The post New Campaigns Distribute Malware via Open Source Hacking Tools appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Chain IQ, UBS Data Stolen in Ransomware Attack

A ransomware group has claimed the theft of millions of files from procurement service provider Chain IQ and 19 other companies. The post Chain IQ, UBS Data Stolen in Ransomware Attack appeared first on SecurityWeek. This article has been indexed…

Krispy Kreme Confirms Data Breach After Ransomware Attack

Krispy Kreme is sending notifications to thousands of people impacted by the data breach that came to light at the end of 2024. The post Krispy Kreme Confirms Data Breach After Ransomware Attack appeared first on SecurityWeek. This article has…

Encryption Backdoors: The Security Practitioners’ View

After decades of failed attempts to access encrypted communications, governments are shifting from persuasion to coercion—security experts say the risks are too high. The post Encryption Backdoors: The Security Practitioners’ View appeared first on SecurityWeek. This article has been indexed…

High-Severity Vulnerabilities Patched by Cisco, Atlassian

Cisco has resolved a high-severity vulnerability in Meraki MX and Meraki Z devices. Atlassian pushed patches for multiple third-party dependencies. The post High-Severity Vulnerabilities Patched by Cisco, Atlassian appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Swedish Truck Giant Scania Investigating Hack

A hacker is selling allegedly valuable data stolen from Scania, but the truck maker believes impact is very limited. The post Swedish Truck Giant Scania Investigating Hack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Russian Hackers Bypass Gmail MFA With App-Specific Password Ruse

Russian hackers posed as US State Department staff and convinced targets to generate and give up Google app-specific passwords. The post Russian Hackers Bypass Gmail MFA With App-Specific Password Ruse appeared first on SecurityWeek. This article has been indexed from…

Russian Hackers Bypass Gmail MFA with App Specific Password Ruse

Russian hackers posed as US State Department staff and convinced targets to generate and give up Google app-specific passwords. The post Russian Hackers Bypass Gmail MFA with App Specific Password Ruse appeared first on SecurityWeek. This article has been indexed…

Critical Vulnerability Patched in Citrix NetScaler

Citrix has released patches for critical- and high-severity vulnerabilities in NetScaler and Secure Access Client and Workspace for Windows. The post Critical Vulnerability Patched in Citrix NetScaler appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Chrome 137 Update Patches High-Severity Vulnerabilities

Google has released a Chrome 137 update to resolve two memory bugs in the browser’s V8 and Profiler components. The post Chrome 137 Update Patches High-Severity Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Products

Veeam and BeyondTrust have resolved several vulnerabilities that could be exploited for remote code execution. The post Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Products appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Zyxel Firewall Vulnerability Again in Attacker Crosshairs

GreyNoise warns of a spike in exploitation attempts targeting a two-year-old vulnerability in Zyxel firewalls. The post Zyxel Firewall Vulnerability Again in Attacker Crosshairs appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Zyxel…

US Insurance Industry Warned of Scattered Spider Attacks

Google is warning insurance companies that Scattered Spider appears to have shifted its focus from the retail sector.  The post US Insurance Industry Warned of Scattered Spider Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Circumvent Raises $6 Million for Cloud Security Platform

Cloud security startup Circumvent has raised $6 million to develop a network of agents for autonomous prioritization and remediation. The post Circumvent Raises $6 Million for Cloud Security Platform appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Asus Armoury Crate Vulnerability Leads to Full System Compromise

A high-severity authorization bypass vulnerability in Asus Armoury Crate provides attackers with low-level system privileges. The post Asus Armoury Crate Vulnerability Leads to Full System Compromise appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Recent Langflow Vulnerability Exploited by Flodrix Botnet

A critical Langflow vulnerability tracked as CVE-2025-3248 has been exploited to ensnare devices in the Flodrix botnet. The post Recent Langflow Vulnerability Exploited by Flodrix Botnet appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Archetyp Dark Web Market Shut Down by Law Enforcement

The Archetyp Market drug marketplace has been targeted by law enforcement in an operation involving takedowns and arrests.  The post Archetyp Dark Web Market Shut Down by Law Enforcement appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Zoomcar Says Hackers Accessed Data of 8.4 Million Users

The Indian car sharing marketplace Zoomcar learned that its systems were hacked after a threat actor contacted employees.  The post Zoomcar Says Hackers Accessed Data of 8.4 Million Users appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Asheville Eye Associates Says 147,000 Impacted by Data Breach

Asheville Eye Associates says the personal information of 147,000 individuals was stolen in a November 2024 data breach. The post Asheville Eye Associates Says 147,000 Impacted by Data Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

240,000 Impacted by Data Breach at Eyecare Tech Firm Ocuco

The KillSec ransomware group has stolen hundreds of gigabytes of data from Ireland-based eyecare technology company Ocuco. The post 240,000 Impacted by Data Breach at Eyecare Tech Firm Ocuco appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Anubis Ransomware Packs a Wiper to Permanently Delete Files

The emerging Anubis ransomware becomes a major threat, permanently deleting user files and making recovery impossible. The post Anubis Ransomware Packs a Wiper to Permanently Delete Files appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Red Teaming AI: The Build Vs Buy Debate

A strong AI deployment starts with asking the right questions, mapping your risks, and thinking like an adversary — before it’s too late. The post Red Teaming AI: The Build Vs Buy Debate appeared first on SecurityWeek. This article has…

Canadian Airline WestJet Hit by Cyberattack

A cybersecurity incident at WestJet resulted in users experiencing interruptions when accessing the company’s application and website. The post Canadian Airline WestJet Hit by Cyberattack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

High-Severity Vulnerabilities Patched in Tenable Nessus Agent

Three high-severity Tenable Agent vulnerabilities could allow users to overwrite and delete files, or execute arbitrary code, with System privileges. The post High-Severity Vulnerabilities Patched in Tenable Nessus Agent appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

TeamFiltration Abused in Entra ID Account Takeover Campaign

Threat actors have abused the TeamFiltration pentesting framework to target over 80,000 Entra ID user accounts. The post TeamFiltration Abused in Entra ID Account Takeover Campaign appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday

Industry professionals comment on the Trump administration’s new executive order on cybersecurity.  The post Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Industry Reactions…

SimpleHelp Vulnerability Exploited Against Utility Billing Software Users

CISA warns that vulnerable SimpleHelp RMM instances have been exploited against a utility billing software provider’s customers. The post SimpleHelp Vulnerability Exploited Against Utility Billing Software Users appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Fog Ransomware Attack Employs Unusual Tools

Multiple legitimate, unusual tools were used in a Fog ransomware attack, including one employed by Chinese hacking group APT41. The post Fog Ransomware Attack Employs Unusual Tools appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

The AI Arms Race: Deepfake Generation vs. Detection

AI-generated voice deepfakes have crossed the uncanny valley, fueling a surge in fraud that outpaces traditional security measures. Detection technology is racing to keep up. The post The AI Arms Race: Deepfake Generation vs. Detection appeared first on SecurityWeek. This…

Hirundo Raises $8 Million to Eliminate AI’s Bad Behavior

Hirundo tackles AI hallucinations and bias by making trained models “forget” poisoned, malicious, and confidential data. The post Hirundo Raises $8 Million to Eliminate AI’s Bad Behavior appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches

The new attack technique uses smartwatches to capture ultrasonic covert communication in air-gapped environments and exfiltrate data. The post New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Surge in Cyberattacks Targeting Journalists: Cloudflare

Between May 2024 and April 2025, Cloudflare blocked 109 billion malicious requests targeting organizations protected under Project Galileo. The post Surge in Cyberattacks Targeting Journalists: Cloudflare appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Palo Alto Networks Patches Privilege Escalation Vulnerabilities

Palo Alto Networks has released patches for seven vulnerabilities and incorporated the latest Chrome fixes in its products. The post Palo Alto Networks Patches Privilege Escalation Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Securonix Acquires Threat Intelligence Firm ThreatQuotient

Cybersecurity heavyweight Securonix acquires ThreatQuotient to boost plans to build an all-in-one security operations stack. The post Securonix Acquires Threat Intelligence Firm ThreatQuotient appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Securonix Acquires…

Maze Banks $25M to Tackle Cloud Security with AI Agents

Maze and its investors are betting on finding profits in software that uses AI-powered agents to automate critical parts of the process. The post Maze Banks $25M to Tackle Cloud Security with AI Agents appeared first on SecurityWeek. This article…

Fortinet, Ivanti Patch High-Severity Vulnerabilities

Patches released by Fortinet and Ivanti resolve over a dozen vulnerabilities, including high-severity flaws leading to code execution, credential leaks. The post Fortinet, Ivanti Patch High-Severity Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

40,000 Security Cameras Exposed to Remote Hacking

Bitsight has identified over 40,000 security cameras that can be easily hacked for spying or other types of malicious activity. The post 40,000 Security Cameras Exposed to Remote Hacking appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Recently Disrupted DanaBot Leaked Valuable Data for 3 Years

Investigators leveraged a vulnerability dubbed DanaBleed to obtain insights into the internal operations of the DanaBot botnet. The post Recently Disrupted DanaBot Leaked Valuable Data for 3 Years appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Horizon3.ai Raises $100 Million in Series D Funding

Horizon3.ai has raised $100 million to expand product capabilities, and to scale its partner ecosystem and federal market presence. The post Horizon3.ai Raises $100 Million in Series D Funding appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Chrome, Firefox Updates Resolve High-Severity Memory Bugs

Google and Mozilla have released patches for a combined total of four high-severity memory bugs in Chrome and Firefox. The post Chrome, Firefox Updates Resolve High-Severity Memory Bugs appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

How Scammers Are Using AI to Steal College Financial Aid

Fake college enrollments have been surging as crime rings deploy “ghost students” — chatbots that join online classrooms and stay just long enough to collect a financial aid check. The post How Scammers Are Using AI to Steal College Financial…

Code Execution Flaws Haunt Adobe Acrobat Reader, Adobe Commerce

Patch Tuesday: Adobe documents hundreds of bugs across multiple products and warns of code execution, feature bypass risks. The post Code Execution Flaws Haunt Adobe Acrobat Reader, Adobe Commerce appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Swimlane Raises $45 Million for Security Automation Platform

Swimlane has raised $45 million in a growth funding round to fuel its global channel expansion and product innovation. The post Swimlane Raises $45 Million for Security Automation Platform appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud

Security researchers uncover critical flaws and widespread misconfigurations in Salesforce’s industry-specific CRM solutions. The post Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Five…

Critical Vulnerability Patched in SAP NetWeaver

SAP has fixed a critical NetWeaver vulnerability allowing attackers to bypass authorization checks and escalate their privileges. The post Critical Vulnerability Patched in SAP NetWeaver appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…