The attacker deployed multiple malware families, including two backdoors and a proxy tunneller, and various reconnaissance tools. The post Threat Actor Connected to Play, RansomHub and DragonForce Ransomware Operations appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Tag: securityweek
Mitsubishi Electric to Acquire Nozomi Networks for Nearly $1 Billion
The industrial cybersecurity firm will become a wholly owned subsidiary of Mitsubishi Electric. The post Mitsubishi Electric to Acquire Nozomi Networks for Nearly $1 Billion appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
Plex Urges Password Resets Following Data Breach
Hackers accessed emails, usernames, password hashes, and authentication data stored in a Plex database. The post Plex Urges Password Resets Following Data Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Plex Urges…
SentinelOne to Acquire Observo AI in $225 Million Deal
SentinelOne is buying Observo AI for a combination of cash and stock to boost its SIEM and data offerings. The post SentinelOne to Acquire Observo AI in $225 Million Deal appeared first on SecurityWeek. This article has been indexed from…
Chinese Spies Impersonated US Lawmaker to Deliver Malware to Trade Groups: Report
China’s APT41 sent out malicious emails on behalf of Rep. John Moolenaar to collect information ahead of US-China trade talks. The post Chinese Spies Impersonated US Lawmaker to Deliver Malware to Trade Groups: Report appeared first on SecurityWeek. This article…
PromptLock Only PoC, but AI-Powered Ransomware Is Real
PromptLock is only a prototype of LLM-orchestrated ransomware, but hackers already use AI in file encryption and extortion attacks. The post PromptLock Only PoC, but AI-Powered Ransomware Is Real appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
GitHub Workflows Attack Affects Hundreds of Repos, Thousands of Secrets
A supply chain attack called GhostAction has enabled threat actors to steal secrets and exploit them. The post GitHub Workflows Attack Affects Hundreds of Repos, Thousands of Secrets appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Salesloft GitHub Account Compromised Months Before Salesforce Attack
The list of impacted cybersecurity firms has been expanded to include BeyondTrust, Bugcrowd, CyberArk, Cato Networks, JFrog, and Rubrik. The post Salesloft GitHub Account Compromised Months Before Salesforce Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Over 6,700 Private Repositories Made Public in Nx Supply Chain Attack
The private repositories of hundreds of organizations were published publicly in the second phase of the Nx supply chain attack. The post Over 6,700 Private Repositories Made Public in Nx Supply Chain Attack appeared first on SecurityWeek. This article has…
Fintech Firm Wealthsimple Says Supply Chain Attack Resulted in Data Breach
Canadian firm Wealthsimple says a data breach impacts the information of some customers, but accounts and funds remain secure. The post Fintech Firm Wealthsimple Says Supply Chain Attack Resulted in Data Breach appeared first on SecurityWeek. This article has been…
Cybersecurity M&A Roundup: 27 Deals Announced in August 2025
Significant cybersecurity M&A deals announced by Accenture, CrowdStrike, F5, Okta, and SentinelOne. The post Cybersecurity M&A Roundup: 27 Deals Announced in August 2025 appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Cybersecurity M&A…
How to Close the AI Governance Gap in Software Development
Widespread adoption of AI coding tools accelerates development—but also introduces critical vulnerabilities that demand stronger governance and oversight. The post How to Close the AI Governance Gap in Software Development appeared first on SecurityWeek. This article has been indexed from…
Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool
Called A2, the framework mimics human analysis to identify vulnerabilities in Android applications and then validates them. The post Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
In Other News: Scammers Abuse Grok, US Manufacturing Attacks, Gmail Security Claims Debunked
Noteworthy stories that might have slipped under the radar: Google fined €325 million, City of Baltimore sent $1.5 million to scammer, Bridgestone targeted in cyberattack. The post In Other News: Scammers Abuse Grok, US Manufacturing Attacks, Gmail Security Claims Debunked…
FireCompass Raises $20 Million for Offensive Security Platform
The AI-powered automated penetration testing firm will invest the new funds in R&D, team expansion, and global scale. The post FireCompass Raises $20 Million for Offensive Security Platform appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
North Korean Hackers Targeted Hundreds in Fake Job Interview Attacks
The hackers were seen actively monitoring cyber threat intelligence to discover and rebuild exposed infrastructure. The post North Korean Hackers Targeted Hundreds in Fake Job Interview Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
More Cybersecurity Firms Hit by Salesforce-Salesloft Drift Breach
Proofpoint, SpyCloud, Tanium, and Tenable confirmed that hackers accessed information stored in their Salesforce instances. The post More Cybersecurity Firms Hit by Salesforce-Salesloft Drift Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
Recent SAP S/4HANA Vulnerability Exploited in Attacks
A critical SAP S/4HANA code injection flaw tracked as CVE-2025-42957 and allowing full system takeover has been exploited in the wild. The post Recent SAP S/4HANA Vulnerability Exploited in Attacks appeared first on SecurityWeek. This article has been indexed from…
Apple Seeks Researchers for 2026 iPhone Security Program
Security researchers interested in participating in the 2026 Apple Security Research Device program can apply until October 31. The post Apple Seeks Researchers for 2026 iPhone Security Program appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products
An AI supply chain issue named Model Namespace Reuse can allow attackers to deploy malicious models and achieve code execution. The post AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products appeared first on SecurityWeek. This article has been…