France’s counterespionage agency is investigating a suspected cyberattack plot targeting an international passenger ferry The post France Probes ‘Foreign Interference’ After Remote Control Malware Found on Passenger Ferry appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Tag: securityweek
SonicWall Patches Exploited SMA 1000 Zero-Day
The medium-severity flaw has been exploited in combination with a critical bug for remote code execution. The post SonicWall Patches Exploited SMA 1000 Zero-Day appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: SonicWall…
China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear
The critical zero-day is tracked as CVE-2025-20393 and it impacts Secure Email Gateway and Secure Email and Web Manager appliances. The post China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear appeared first on SecurityWeek. This article has been indexed from…
NMFTA Warns of Surge and Sophistication of Cyber-Enabled Cargo Theft
The trucking industry group has released its 2026 Transportation Industry Cybersecurity Trends Report. The post NMFTA Warns of Surge and Sophistication of Cyber-Enabled Cargo Theft appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
New $150 Cellik RAT Grants Android Control, Trojanizes Google Play Apps
The malware provides full device control and real-time surveillance capabilities like those of advanced spyware. The post New $150 Cellik RAT Grants Android Control, Trojanizes Google Play Apps appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Hacker Conversations: Alex Hall, One-time Fraudster
A first-person journey from undetected fraud to defending trust—how life events, neurodiversity, and hard-won insight shaped a former fraudster into a fraud fighter. The post Hacker Conversations: Alex Hall, One-time Fraudster appeared first on SecurityWeek. This article has been indexed…
Five Cybersecurity Predictions for 2026: Identity, AI, and the Collapse of Perimeter Thinking
Cybersecurity has always evolved in response to attacker innovation, but the pace of change over the last few years has been unprecedented—particularly with the emergence of weaponized AI to scale phishing, deepfakes, and voice cloning. As we head toward 2026,…
Adaptive Security Raises $81 Million in Series B Funding
Led by Bain Capital Ventures, the investment round brings the total raised by the company to $146.5 million. The post Adaptive Security Raises $81 Million in Series B Funding appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
GhostPoster Firefox Extensions Hide Malware in Icons
The malware hijacks purchase commissions, tracks users, removes security headers, injects hidden iframes, and bypasses CAPTCHA. The post GhostPoster Firefox Extensions Hide Malware in Icons appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
Auto Parts Giant LKQ Confirms Oracle EBS Breach
LKQ said the personal information of thousands of individuals was compromised as a result of the hacker attack. The post Auto Parts Giant LKQ Confirms Oracle EBS Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Dux Emerges From Stealth Mode With $9 Million in Funding
The startup takes an agentic approach to preventing vulnerability exploitation by uncovering exposure across assets. The post Dux Emerges From Stealth Mode With $9 Million in Funding appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
From Open Source to OpenAI: The Evolution of Third-Party Risk
From open source libraries to AI-powered coding assistants, speed-driven development is introducing new third-party risks that threat actors are increasingly exploiting. The post From Open Source to OpenAI: The Evolution of Third-Party Risk appeared first on SecurityWeek. This article has…
CISO Communities – Cybersecurity’s Secret Weapon
Closed CISO communities act as an information exchange, advice center, pressure valve, and safe haven from critical oversight. The post CISO Communities – Cybersecurity’s Secret Weapon appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
700,000 Records Compromised in Askul Ransomware Attack
The e-commerce and logistics company was targeted by the RansomHouse ransomware group in October. The post 700,000 Records Compromised in Askul Ransomware Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: 700,000 Records…
Verisoul Raises $8.8 Million for Fraud Prevention
The company plans to accelerate product development, scale go-to-market efforts, and hire new talent. The post Verisoul Raises $8.8 Million for Fraud Prevention appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Verisoul Raises…
Echo Raises $35 Million in Series A Funding
The fresh investment comes less than six months after the startup’s seed funding announcement. The post Echo Raises $35 Million in Series A Funding appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Echo…
Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks
After years of exploiting zero-day and n-day vulnerabilities, Russian state-sponsored threat actors are shifting to misconfigured devices. The post Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
JumpCloud Remote Assist Vulnerability Can Expose Systems to Takeover
The issue allows attackers to write arbitrary data to any file, or delete arbitrary files to obtain System privileges. The post JumpCloud Remote Assist Vulnerability Can Expose Systems to Takeover appeared first on SecurityWeek. This article has been indexed from…
User Data Compromised in SoundCloud Hack
SoundCloud said the information of 20% of users was accessed by hackers who breached its systems. The post User Data Compromised in SoundCloud Hack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: User…
In-the-Wild Exploitation of Fresh Fortinet Flaws Begins
Threat actors are exploiting the two critical authentication bypass vulnerabilities against FortiGate appliances. The post In-the-Wild Exploitation of Fresh Fortinet Flaws Begins appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: In-the-Wild Exploitation of…