Tag: securityweek

Unprotected DeepSeek Database Exposed Chats, Other Sensitive Information

An unprotected database belonging to Chinese AI company DeepSeek exposed highly sensitive information, including chat history, secret keys, and backend data. The post Unprotected DeepSeek Database Exposed Chats, Other Sensitive Information appeared first on SecurityWeek. This article has been indexed…

New Zyxel Zero-Day Under Attack, No Patch Available

GreyNoise reports active exploitation of a newly discovered zero-day vulnerability in Zyxel CPE devices. There are no patches available. The post New Zyxel Zero-Day Under Attack, No Patch Available appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Oligo Raises $50M to Tackle Application Detection and Response

Oligo Security has raised $50 million in Series B funding for its application detection and response (ADR) platform. The post Oligo Raises $50M to Tackle Application Detection and Response appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Aquabot Botnet Targeting Vulnerable Mitel Phones

The Mirai-based Aquabot botnet has been targeting a vulnerability in Mitel SIP phones for which a proof-of-concept (PoC) exploit exists. The post Aquabot Botnet Targeting Vulnerable Mitel Phones appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Smiths Group Scrambling to Restore Systems Following Cyberattack

Engineering firm Smiths Group has disclosed a cyberattack that forced it to take some systems offline and activate business continuity plans. The post Smiths Group Scrambling to Restore Systems Following Cyberattack appeared first on SecurityWeek. This article has been indexed…

Rockwell Patches Critical, High-Severity Vulnerabilities in Several Products

Rockwell Automation has released six new security advisories to inform customers about several critical and high-severity vulnerabilities. The post Rockwell Patches Critical, High-Severity Vulnerabilities in Several Products appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

SimpleHelp Remote Access Software Exploited in Attacks

Threat actors have been exploiting SimpleHelp remote access software shortly after the disclosure of three vulnerabilities. The post SimpleHelp Remote Access Software Exploited in Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Eclypsium Eyes Global Expansion with $45 Million Series C Investment

The investment includes equity and debt from new investors Qualcomm Ventures, Pavilion Capital, Singtel Innov8, and Sixty Degree Capital.  The post Eclypsium Eyes Global Expansion with $45 Million Series C Investment appeared first on SecurityWeek. This article has been indexed…

Hackers Drain Over $85 Million From Crypto Exchange Phemex

Hackers stole more than $85 million in crypto assets from hot wallets at cryptocurrency exchange Phemex. The post Hackers Drain Over $85 Million From Crypto Exchange Phemex appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

European Union Sanctions Russian Nationals for Hacking Estonia

The European Union has added three Russian nationals to its sanctions list for their involvement in cyberattacks against Estonia. The post European Union Sanctions Russian Nationals for Hacking Estonia appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

DeepSeek Blames Disruption on Cyberattack as Vulnerabilities Emerge

China’s DeepSeek blamed sign-up disruptions on a cyberattack as researchers started finding vulnerabilities in the R1 AI model.  The post DeepSeek Blames Disruption on Cyberattack as Vulnerabilities Emerge appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

ENGlobal Says Personal Information Accessed in Ransomware Attack

ENGlobal has informed the SEC that personal information was compromised in a November 2024 ransomware attack. The post ENGlobal Says Personal Information Accessed in Ransomware Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

SonicWall Confirms Exploitation of New SMA Zero-Day

SonicWall has confirmed that an SMA 1000 zero-day tracked as CVE-2025-23006 has been exploited in the wild. The post SonicWall Confirms Exploitation of New SMA Zero-Day appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Apple Patches First Exploited iOS Zero-Day of 2025

Apple has released fixes for dozens of vulnerabilities in its mobile and desktop products, including an iOS zero-day exploited in attacks. The post Apple Patches First Exploited iOS Zero-Day of 2025 appeared first on SecurityWeek. This article has been indexed…

TalkTalk Confirms Data Breach, Downplays Impact

UK telecoms firm TalkTalk has confirmed falling victim to a data breach after a threat actor boasted about hacking it. The post TalkTalk Confirms Data Breach, Downplays Impact appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Cyber Insights 2025: Cybersecurity Regulatory Mayhem

Cybersecurity regulations are facing a tipping point. There are too many and they are too complex to manage – and it’s getting worse. The post Cyber Insights 2025: Cybersecurity Regulatory Mayhem appeared first on SecurityWeek. This article has been indexed…

Git Vulnerabilities Led to Credentials Exposure

Vulnerabilities in Git’s credential retrieval protocol could have allowed attackers to compromise user credentials. The post Git Vulnerabilities Led to Credentials Exposure appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Git Vulnerabilities Led…

Subaru Starlink Vulnerability Exposed Cars to Remote Hacking

A vulnerability in Subaru’s Starlink connected vehicle service exposed US, Canada, and Japan vehicle and customer accounts. The post Subaru Starlink Vulnerability Exposed Cars to Remote Hacking appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

North Korean Fake IT Workers More Aggressively Extorting Enterprises

North Korean fake IT workers are more aggressively extorting their employers in response to law enforcement actions. The post North Korean Fake IT Workers More Aggressively Extorting Enterprises appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

US Charges Five People Over North Korean IT Worker Scheme

The US has announced charges against five individuals involved in a fake IT workers scheme to funnel funds to North Korea. The post US Charges Five People Over North Korean IT Worker Scheme appeared first on SecurityWeek. This article has…

CISA Warns of Old jQuery Vulnerability Linked to Chinese APT

CISA has added the JQuery flaw CVE-2020-11023, previously linked to APT1, to its Known Exploited Vulnerabilities (KEV) catalog.   The post CISA Warns of Old jQuery Vulnerability Linked to Chinese APT appeared first on SecurityWeek. This article has been indexed from…

Cyber Insights 2025: Social Engineering Gets AI Wings

Business resilience must be the ultimate purpose of all the security controls and processes we employ, because we will never conclusively defeat or protect ourselves from social engineering. The post Cyber Insights 2025: Social Engineering Gets AI Wings appeared first…

Conduent Confirms Cyberattack After Government Agencies Report Outages

Conduent has confirmed suffering disruptions due to a cyberattack after government agencies reported service outages. The post Conduent Confirms Cyberattack After Government Agencies Report Outages appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Cyber Insights 2025: Malware Directions

The continuing advance of AI brings the likelihood of effective, specific vulnerability-targeted new malware automatically produced in hours rather than days or weeks ever closer. The post Cyber Insights 2025: Malware Directions appeared first on SecurityWeek. This article has been…

Axoflow Raises $7 Million for Security Data Curation Platform

Security data pipeline management startup Axoflow has raised $7 million in a seed funding round led by EBRD Venture Capital. The post Axoflow Raises $7 Million for Security Data Curation Platform appeared first on SecurityWeek. This article has been indexed…

Homebrew macOS Users Targeted With Information Stealer Malware

A malicious campaign has been redirecting macOS users to a fake Homebrew website, infecting them with information stealer malware. The post Homebrew macOS Users Targeted With Information Stealer Malware appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Tesla Charger Exploits Earn Hackers $129,000 at Pwn2Own

Hackers earned more than $700,000 on the first two days of Pwn2Own Automotive 2025 for EV charger and infotainment exploits. The post Tesla Charger Exploits Earn Hackers $129,000 at Pwn2Own appeared first on SecurityWeek. This article has been indexed from…

Cisco Patches Critical Vulnerability in Meeting Management

Cisco has released patches for three vulnerabilities, including a critical privilege escalation bug and a DoS flaw for which exploit code exists. The post Cisco Patches Critical Vulnerability in Meeting Management appeared first on SecurityWeek. This article has been indexed…

SonicWall Learns From Microsoft About Potentially Exploited Zero-Day

SonicWall has credited Microsoft for reporting CVE-2025-23006, a critical remote command execution vulnerability possibly exploited in the wild. The post SonicWall Learns From Microsoft About Potentially Exploited Zero-Day appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Record Number of Ransomware Attacks in December 2024

NCC Group saw over 570 ransomware attacks in December 2024, the highest number since it started monitoring them in 2021.  The post Record Number of Ransomware Attacks in December 2024 appeared first on SecurityWeek. This article has been indexed from…

Cyber Insights 2025: APIs – The Threat Continues

APIs are easy to develop, simple to implement, and frequently attacked. They are  prime and lucrative targets for cybercriminals.  The post Cyber Insights 2025: APIs – The Threat Continues appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Murdoc Botnet Ensnaring Avtech, Huawei Devices

The Mirai-based Murdoc botnet has been actively targeting Avtech and Huawei devices for roughly half a year. The post Murdoc Botnet Ensnaring Avtech, Huawei Devices appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Record-Breaking DDoS Attack Reached 5.6 Tbps

Cloudflare saw a 53% increase in DDoS attack frequency last year, when it blocked a record-breaking 5.6 Tbps attack. The post Record-Breaking DDoS Attack Reached 5.6 Tbps appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Book Review: Infected – A Candid Look at VirusTotal’s Birth and Legacy

Part entrepreneurial adventure, part security history, Bernardo Quintero’s ‘Infected’ documents how the VirusTotal side project became a threat-intel cornerstone. The post Book Review: Infected – A Candid Look at VirusTotal’s Birth and Legacy appeared first on SecurityWeek. This article has…

Trump Pardons Founder of Silk Road Website

President Donald Trump has pardoned Ross Ulbricht, the founder of Silk Road, an underground website for selling drugs. The post Trump Pardons Founder of Silk Road Website appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Ransomware Groups Abuse Microsoft Services for Initial Access

Sophos warns of two ransomware groups abusing Microsoft 365 services and default configurations to contact internal enterprise users. The post Ransomware Groups Abuse Microsoft Services for Initial Access appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Students, Educators Impacted by PowerSchool Data Breach

PowerSchool says the personal information of students and educators was stolen in a December 2024 data breach. The post Students, Educators Impacted by PowerSchool Data Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Social Media Security Firm Spikerz Raises $7 Million

Social media security startup Spikerz has raised $7 million in a seed funding round led by Disruptive AI. The post Social Media Security Firm Spikerz Raises $7 Million appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Details Disclosed for Mercedes-Benz Infotainment Vulnerabilities

Kaspersky has disclosed the details of over a dozen vulnerabilities discovered in a Mercedes-Benz MBUX infotainment system.  The post Details Disclosed for Mercedes-Benz Infotainment Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

FCC Taking Action in Response to China’s Telecoms Hacking

The FCC adopts declaratory ruling requiring telecommunications providers to secure their networks against nation-states and other threats. The post FCC Taking Action in Response to China’s Telecoms Hacking appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

CISA, FBI Update Software Security Recommendations

CISA and the FBI have updated their guidance regarding risky software security bad practices based on feedback received from the public. The post CISA, FBI Update Software Security Recommendations  appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Wolf Haldenstein Data Breach Impacts 3.4 Million People

Law firm Wolf Haldenstein Adler Freeman & Herz LLP says more than 3.4 million people were impacted by a December 2023 data breach. The post Wolf Haldenstein Data Breach Impacts 3.4 Million People appeared first on SecurityWeek. This article has…

Google Releases Open Source Library for Software Composition Analysis

Google releases OSV-SCALIBR, an open source library for software composition analysis and file system scanning. The post Google Releases Open Source Library for Software Composition Analysis appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Industry Reactions to Biden’s Cybersecurity Executive Order: Feedback Friday

Industry professionals comment on the Biden administration’s new executive order on cybersecurity.  The post Industry Reactions to Biden’s Cybersecurity Executive Order: Feedback Friday appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Industry Reactions…

Cisco Unveils New AI Application Security Solution

Cisco has unveiled AI Defense, a solution designed to help organizations protect development and use of AI applications.  The post Cisco Unveils New AI Application Security Solution appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Russian Cyberspies Caught Spear-Phishing with QR Codes, WhatsApp Groups

Microsoft researchers catches Russia’s Star Blizzard hackers spear-phishing with QR codes and WhatsApp group chats. The post Russian Cyberspies Caught Spear-Phishing with QR Codes, WhatsApp Groups appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Wultra Raises €3 Million for Post-Quantum Authentication

Authentication solutions provider Wultra has raised €3 million (~$3.1 million) for its post-quantum technology. The post Wultra Raises €3 Million for Post-Quantum Authentication appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Wultra Raises…

North Korean Hackers Targeting Freelance Software Developers

North Korea-linked Lazarus Group is targeting freelance software developers to compromise the supply chain. The post North Korean Hackers Targeting Freelance Software Developers appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: North Korean…

Cyber Insights 2025: Identities

Both human and machine identities occupy a unique position: they are simultaneously the foundation of cybersecurity and its weakest link. The post Cyber Insights 2025: Identities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Data From 15,000 Fortinet Firewalls Leaked by Hackers

Hackers have leaked 15,000 Fortinet firewall configurations, which were apparently obtained as a result of exploitation of CVE-2022–40684. The post Data From 15,000 Fortinet Firewalls Leaked by Hackers appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Chrome 132 Patches 16 Vulnerabilities

Google has released Chrome 132 with fixes for 16 vulnerabilities, including multiple high-severity security defects. The post Chrome 132 Patches 16 Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Chrome 132 Patches…

Nvidia, Zoom, Zyxel Patch High-Severity Vulnerabilities

Nvidia, Zoom, and Zyxel have released patches for multiple high-severity vulnerabilities across their products. The post Nvidia, Zoom, Zyxel Patch High-Severity Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Nvidia, Zoom, Zyxel…

Ivanti Patches Critical Vulnerabilities in Endpoint Manager

Ivanti has released patches for multiple vulnerabilities in Endpoint Manager (EPM), including four critical-severity flaws. The post Ivanti Patches Critical Vulnerabilities in Endpoint Manager appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Ivanti…

Adobe: Critical Code Execution Flaws in Photoshop

Patch Tuesday: Adobe ships patches for more than a dozen security defects in a wide range of software products. The post Adobe: Critical Code Execution Flaws in Photoshop appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Microsoft Patches Trio of Exploited Windows Hyper-V Zero-Days

Patch Tuesday: Microsoft has rushed out fixes for a trio of already-exploited zero-day vulnerabilities in the Windows Hyper-V platform. The post Microsoft Patches Trio of Exploited Windows Hyper-V Zero-Days appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

UK Considers Banning Ransomware Payment by Public Sector and CNI

Since no technical means have been found to curtail criminal extortion through prevention or attack, the new proposal is to eliminate its profitability. The post UK Considers Banning Ransomware Payment by Public Sector and CNI appeared first on SecurityWeek. This…

BforeAI Raises $10 Million for Predictive Attack Intelligence

BforeAI has raised $10 million in Series B funding, which brings the total raised by the security firm to more than $30 million. The post BforeAI Raises $10 Million for Predictive Attack Intelligence appeared first on SecurityWeek. This article has…

How to Eliminate “Shadow AI” in Software Development

With a security-first culture fully in play, developers will view the protected deployment of AI as a marketable skill, and respond accordingly. The post How to Eliminate “Shadow AI” in Software Development appeared first on SecurityWeek. This article has been…

Cyber Insights 2025: Cyber Threat Intelligence

Cyber threat intelligence can inform decisions but is a complex issue. Where it is complete and accurate it is a huge boon. The post Cyber Insights 2025: Cyber Threat Intelligence appeared first on SecurityWeek. This article has been indexed from…

SAP Patches Critical Vulnerabilities in NetWeaver

SAP has released 14 security notes on January 2025 Patch Day, including two addressing critical vulnerabilities in NetWeaver. The post SAP Patches Critical Vulnerabilities in NetWeaver appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Compromised AWS Keys Abused in Codefinger Ransomware Attacks

A ransomware group tracked as Codefinger is using compromised AWS keys to encrypt S3 bucket data using SSE-C. The post Compromised AWS Keys Abused in Codefinger Ransomware Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

CISA Warns of Second BeyondTrust Vulnerability Exploited in Attacks

Attackers have been exploiting a second vulnerability in BeyondTrust’s remote management solutions, CISA warns. The post CISA Warns of Second BeyondTrust Vulnerability Exploited in Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Infostealer Infections Lead to Telefonica Ticketing System Breach

Infostealer malware allowed threat actors to compromise Telefonica employees’ credentials and access the company’s internal ticketing system. The post Infostealer Infections Lead to Telefonica Ticketing System Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Infostealer Masquerades as PoC Code Targeting Recent LDAP Vulnerability

A fake proof-of-concept (PoC) exploit for a recent LDAP vulnerability distributes information stealer malware. The post Infostealer Masquerades as PoC Code Targeting Recent LDAP Vulnerability appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…