If the deal is sealed, SpaceX would provide encryption services for the Italian government and communications infrastructure for the military and emergency services. The post Meloni Says Italy Is Exploring Deals on Telecoms Security, but Denies Private Talks With Musk…
Category: securityweek
In Other News: Bank of America Warns of Data Breach, Trucking Cybersecurity, Treasury Hack Linked to Silk Typhoon
Noteworthy stories that might have slipped under the radar: 2025 trucking cybersecurity report, Bank of America discloses data breach, Silk Typhoon behind US Treasury hack. The post In Other News: Bank of America Warns of Data Breach, Trucking Cybersecurity, Treasury…
Banshee macOS Malware Expands Targeting
The latest version of the Banshee macOS information stealer no longer checks if the infected systems have the Russian language installed. The post Banshee macOS Malware Expands Targeting appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
PayPal Phishing Campaign Employs Genuine Links to Take Over Accounts
Fortinet warns of a phishing campaign that uses legitimate links to take over the victims’ PayPal accounts. The post PayPal Phishing Campaign Employs Genuine Links to Take Over Accounts appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Darktrace to Acquire Incident Investigation Firm Cado Security
Darktrace has announced the proposed acquisition of UK-based incident investigation firm Cado Security, reportedly for up to $100 million. The post Darktrace to Acquire Incident Investigation Firm Cado Security appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
GFI KerioControl Firewall Vulnerability Exploited in the Wild
Threat actors are exploiting a recent GFI KerioControl firewall vulnerability that leads to remote code execution. The post GFI KerioControl Firewall Vulnerability Exploited in the Wild appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
The ‘Worst in Show’ CES Products Put Your Data at Risk and Cause Waste, Privacy Advocates Say
Some of the innovative products presented at CES can pose a serious risk to data and privacy. The post The ‘Worst in Show’ CES Products Put Your Data at Risk and Cause Waste, Privacy Advocates Say appeared first on SecurityWeek.…
From Silos to Synergy: Transforming Threat Intelligence Sharing in 2025
In the face of ever-growing threats and adversaries, organizations must break down the silos between ALL teams involved in security. The post From Silos to Synergy: Transforming Threat Intelligence Sharing in 2025 appeared first on SecurityWeek. This article has been…
Exploitation of New Ivanti VPN Zero-Day Linked to Chinese Cyberspies
Google Cloud’s Mandiant has linked the exploitation of CVE-2025-0282, a new Ivanti VPN zero-day, to Chinese cyberspies. The post Exploitation of New Ivanti VPN Zero-Day Linked to Chinese Cyberspies appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Ivanti Warns of New Zero-Day Attacks Hitting Connect Secure Product
Ivanti confirms zero-day exploitation of a remotely exploitable code execution flaw in its Connect Security product line. The post Ivanti Warns of New Zero-Day Attacks Hitting Connect Secure Product appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Telegram Shared Data of Thousands of Users After CEO’s Arrest
After its CEO was arrested last summer, Telegram has been increasingly sharing user data at the request of authorities. The post Telegram Shared Data of Thousands of Users After CEO’s Arrest appeared first on SecurityWeek. This article has been indexed…
Japan Links Chinese Hacker MirrorFace to Dozens of Cyberattacks Targeting Security and Tech Data
Japan says China-linked cyberattacks were systematic attacks with an aim of stealing data on Japanese national security and advanced technology. The post Japan Links Chinese Hacker MirrorFace to Dozens of Cyberattacks Targeting Security and Tech Data appeared first on SecurityWeek.…
Rationalizing the Stack: The Case for Security Vendor Consolidation
Consolidating from an overly burdensome number of point solutions to an easier to manage platform-based approach brings with it a number of benefits. The post Rationalizing the Stack: The Case for Security Vendor Consolidation appeared first on SecurityWeek. This article…
Thousands Impacted by Casio Data Breach
Casio has completed its investigation into the data breach caused by a recent ransomware attack and found that thousands of individuals are impacted. The post Thousands Impacted by Casio Data Breach appeared first on SecurityWeek. This article has been indexed…
Cybersecurity Funding Reached $9.5 Billion in 2024: Report
Cybersecurity firms raised $9.5 billion in over 300 funding rounds in 2024, with Wiz scoring the largest investment at $1 billion. The post Cybersecurity Funding Reached $9.5 Billion in 2024: Report appeared first on SecurityWeek. This article has been indexed…
Insider Threat: Tackling the Complex Challenges of the Enemy Within
The insider threat problem will worsen, and the solutions will widen, in the age of generative-AI. The post Insider Threat: Tackling the Complex Challenges of the Enemy Within appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Chrome 131, Firefox 134 Updates Patch High-Severity Vulnerabilities
Chrome and Firefox updates released this week resolve high-severity vulnerabilities in the two popular browsers. The post Chrome 131, Firefox 134 Updates Patch High-Severity Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
First Android Update of 2025 Patches Critical Code Execution Vulnerabilities
This year’s first batch of monthly security updates for Android resolves 36 vulnerabilities, including critical remote code execution flaws. The post First Android Update of 2025 Patches Critical Code Execution Vulnerabilities appeared first on SecurityWeek. This article has been indexed…
Veracode Targets Malicious Code Threats With Phylum Acquisition
The deal includes certain Phylum assets, including its malicious package analysis, detection, and mitigation technology. The post Veracode Targets Malicious Code Threats With Phylum Acquisition appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Veracode…
Veracode Targets Malicious Code Threats with Phylum Acquisition
The deal includes certain Phylum assets, including its malicious package analysis, detection, and mitigation technology. The post Veracode Targets Malicious Code Threats with Phylum Acquisition appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Veracode…