Tag: securityweek

Cato Networks Raises $359 Million to Expand SASE Business

Founded in 2015, the Tel Aviv based company has now raised more than $1 billion and claims more than 3,500 customers. The post Cato Networks Raises $359 Million to Expand SASE Business appeared first on SecurityWeek. This article has been…

NASA Needs Agency-Wide Cybersecurity Risk Assessment: GAO

NASA needs to perform an agency-wide cybersecurity risk assessment and to complete important cybersecurity tasks for each of its projects. The post NASA Needs Agency-Wide Cybersecurity Risk Assessment: GAO appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Airoha Chip Vulnerabilities Expose Headphones to Takeover

Vulnerabilities in Airoha Bluetooth SoCs expose headphone and earbud products from multiple vendors to takeover attacks. The post Airoha Chip Vulnerabilities Expose Headphones to Takeover appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Casie Antalis Named Executive Director of CISA

Casie Antalis is the new executive director of the Cybersecurity and Infrastructure Security Agency after the departure of Bridget Bean. The post Casie Antalis Named Executive Director of CISA appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Canada Gives Hikvision the Boot on National Security Grounds

Canada has ordered Hikvision to cease all operations in the country and prohibited the purchase and use of Hikvision products within government entities. The post Canada Gives Hikvision the Boot on National Security Grounds appeared first on SecurityWeek. This article…

Patrick Ware Named Executive Director of US Cyber Command

The NSA’s Patrick Ware has taken up the role of Cybercrom executive director after the departure of Morgan Adamski. The post Patrick Ware Named Executive Director of US Cyber Command appeared first on SecurityWeek. This article has been indexed from…

Ahold Delhaize Data Breach Impacts 2.2 Million People

The ransomware attack against grocery giant Ahold Delhaize has resulted in the personal information of millions getting stolen. The post Ahold Delhaize Data Breach Impacts 2.2 Million People appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

RevEng.ai Raises $4.15 Million to Secure Software Supply Chain

RevEng.ai has raised $4.15 million in seed funding for an AI platform that automatically detects malicious code and vulnerabilities in software. The post RevEng.ai Raises $4.15 Million to Secure Software Supply Chain appeared first on SecurityWeek. This article has been…

Chinese Hackers Target Chinese Users With RAT, Rootkit

China-linked Silver Fox hacking group is targeting Chinese users with fake installers carrying a RAT and a rootkit. The post Chinese Hackers Target Chinese Users With RAT, Rootkit appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Evidence Suggests Exploitation of CitrixBleed 2 Vulnerability

The Citrix NetScaler vulnerability tracked as CitrixBleed 2 and CVE-2025–5777 may be exploited in the wild for initial access. The post Evidence Suggests Exploitation of CitrixBleed 2 Vulnerability appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Vulnerability Exposed All Open VSX Repositories to Takeover

A vulnerability in the extension publishing mechanism of Open VSX could have allowed attackers to tamper with any repository. The post Vulnerability Exposed All Open VSX Repositories to Takeover appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Microsoft 365 Direct Send Abused for Phishing

Hackers are abusing the Microsoft 365 Direct Send feature to deliver phishing emails that bypass email security controls. The post Microsoft 365 Direct Send Abused for Phishing appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Bipartisan Bill Aims to Block Chinese AI From Federal Agencies

The proposal seeks to ban all use of the technology in the U.S. government, with exceptions for use in research and counterterrorism efforts. The post Bipartisan Bill Aims to Block Chinese AI From Federal Agencies appeared first on SecurityWeek. This…

Bonfy.AI Raises $9.5 Million for Adaptive Content Security Platform

Bonfy.AI has emerged from stealth mode to help organizations prevent cybersecurity, privacy and compliance risks. The post Bonfy.AI Raises $9.5 Million for Adaptive Content Security Platform appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

CISA Warns AMI BMC Vulnerability Exploited in the Wild

CISA is urging federal agencies to patch a recent AMI BMC vulnerability and a half-a-decade-old bug in FortiOS by July 17. The post CISA Warns AMI BMC Vulnerability Exploited in the Wild appeared first on SecurityWeek. This article has been…

Central Kentucky Radiology Data Breach Impacts 167,000

The personal information of 167,000 individuals was compromised in an October 2024 data breach at Central Kentucky Radiology. The post Central Kentucky Radiology Data Breach Impacts 167,000 appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Critical Cisco ISE Vulnerabilities Allow Remote Code Execution

Two critical vulnerabilities in Cisco ISE could allow remote attackers to execute arbitrary code with root privileges. The post Critical Cisco ISE Vulnerabilities Allow Remote Code Execution  appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Critical Citrix NetScaler Flaw Exploited as Zero-Day

Citrix has released patches for a critical vulnerability in NetScaler ADC and NetScaler Gateway exploited as a zero-day. The post Critical Citrix NetScaler Flaw Exploited as Zero-Day appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Thousands of SaaS Apps Could Still Be Susceptible to nOAuth

New research suggests more than 10,000 SaaS apps could remain vulnerable to a nOAuth variant despite the basic issue being disclosed in June 2023. The post Thousands of SaaS Apps Could Still Be Susceptible to nOAuth appeared first on SecurityWeek.…

Hackers Abuse ConnectWise to Hide Malware

G Data has observed a surge in malware infections originating from ConnectWise applications with modified certificate tables. The post Hackers Abuse ConnectWise to Hide Malware appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

New Vulnerabilities Expose Millions of Brother Printers to Hacking

Rapid7 has found several serious vulnerabilities affecting over 700 printer models from Brother and other vendors.  The post New Vulnerabilities Expose Millions of Brother Printers to Hacking appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

SonicWall Warns of Trojanized NetExtender Stealing User Information

SonicWall says a modified version of the legitimate NetExtender application contains information-stealing code. The post SonicWall Warns of Trojanized NetExtender Stealing User Information appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: SonicWall Warns…

Code Execution Vulnerability Patched in GitHub Enterprise Server

A high-severity vulnerability in GitHub Enterprise Server could have allowed remote attackers to execute arbitrary code. The post Code Execution Vulnerability Patched in GitHub Enterprise Server appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Why Sincerity Is a Strategic Asset in Cybersecurity

Strong security doesn’t just rely on tools—it starts with trust, clarity, and sincerity from the top down. The post Why Sincerity Is a Strategic Asset in Cybersecurity appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Chrome 138, Firefox 140 Patch Multiple Vulnerabilities

Chrome 138 and Firefox 140 are rolling out with fixes for two dozen vulnerabilities, including high-severity memory safety issues. The post Chrome 138, Firefox 140 Patch Multiple Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Russian APT Hits Ukrainian Government With New Malware via Signal

Russia-linked APT28 deployed new malware against Ukrainian government targets through malicious documents sent via Signal chats. The post Russian APT Hits Ukrainian Government With New Malware via Signal appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Siemens Notifies Customers of Microsoft Defender Antivirus Issue

Siemens is working with Microsoft to address a Defender Antivirus problem that can lead to no malware alerts or plant disruptions. The post Siemens Notifies Customers of Microsoft Defender Antivirus Issue appeared first on SecurityWeek. This article has been indexed…

Prometei Botnet Activity Spikes

Palo Alto Networks has observed a spike in Prometei activity since March 2025, pointing to a resurgence of the botnet. The post Prometei Botnet Activity Spikes appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play

Newly discovered spyware has sneaked into Apple’s App Store and Google Play to steal images from users’ mobile devices. The post Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play appeared first on SecurityWeek. This article has been indexed from…

Chinese APT Hacking Routers to Build Espionage Infrastructure

A Chinese APT has been infecting SOHO routers with the ShortLeash backdoor to build stealthy espionage infrastructure. The post Chinese APT Hacking Routers to Build Espionage Infrastructure appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Apple, Netflix, Microsoft Sites ‘Hacked’ for Tech Support Scams

Tech support scammers are using sponsored ads and search parameter injection to trick users into calling them. The post Apple, Netflix, Microsoft Sites ‘Hacked’ for Tech Support Scams  appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

North Korean Hackers Take Over Victims’ Systems Using Zoom Meeting

North Korean hackers employ social engineering to trick Zoom Meeting participants into executing system-takeover commands. The post North Korean Hackers Take Over Victims’ Systems Using Zoom Meeting appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

China’s Salt Typhoon Hackers Target Canadian Telecom Firms

Canada’s Centre for Cyber Security and the FBI warn of Chinese hackers targeting telecommunications and other companies in Canada. The post China’s Salt Typhoon Hackers Target Canadian Telecom Firms appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

New AI Jailbreak Bypasses Guardrails With Ease

New “Echo Chamber” attack bypasses advanced LLM safeguards by subtly manipulating conversational context, proving highly effective across leading AI models. The post New AI Jailbreak Bypasses Guardrails With Ease appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

US Braces for Cyberattacks After Bombing Iranian Nuclear Sites

Iranian hackers are expected to intensify cyberattacks against the US after the recent air strikes on Iran’s nuclear sites. The post US Braces for Cyberattacks After Bombing Iranian Nuclear Sites appeared first on SecurityWeek. This article has been indexed from…

743,000 Impacted by McLaren Health Care Data Breach

The personal information of 743,000 individuals was compromised in a 2024 ransomware attack on McLaren Health Care. The post 743,000 Impacted by McLaren Health Care Data Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Critical Authentication Bypass Flaw Patched in Teleport

A critical-severity vulnerability in Teleport could allow remote attackers to bypass SSH authentication and access managed systems. The post Critical Authentication Bypass Flaw Patched in Teleport appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

US Braces for Cyberattacks After Joining Israel-Iran War

Iranian hackers are expected to intensify cyberattacks against the US after the recent air strikes on Iran’s nuclear sites. The post US Braces for Cyberattacks After Joining Israel-Iran War appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Steelmaker Nucor Says Hackers Stole Data in Recent Attack

Nucor has shared an update on the impact of the recent cyberattack and confirmed that some data has been taken from its IT systems. The post Steelmaker Nucor Says Hackers Stole Data in Recent Attack appeared first on SecurityWeek. This…

Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider

Cloudflare has blocked yet another record-breaking DDoS attack, which delivered the equivalent of 9,000 HD movies in just 45 seconds. The post Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider appeared first on SecurityWeek. This article has been indexed from…

Godfather Android Trojan Creates Sandbox on Infected Devices

The Godfather Android trojan uses on-device virtualization to hijack legitimate applications and steal users’ funds. The post Godfather Android Trojan Creates Sandbox on Infected Devices appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Motors Theme Vulnerability Exploited to Hack WordPress Websites

Threat actors are exploiting a critical-severity vulnerability in Motors theme for WordPress to change arbitrary user passwords. The post Motors Theme Vulnerability Exploited to Hack WordPress Websites appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

FreeType Zero-Day Found by Meta Exploited in Paragon Spyware Attacks

WhatsApp told SecurityWeek that it linked the exploited FreeType vulnerability CVE-2025-27363 to a Paragon exploit. The post FreeType Zero-Day Found by Meta Exploited in Paragon Spyware Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Cloudflare Tunnels Abused in New Malware Campaign

A threat actor is abusing Cloudflare Tunnels for the delivery of a Python loader as part of a complex infection chain. The post Cloudflare Tunnels Abused in New Malware Campaign appeared first on SecurityWeek. This article has been indexed from…

161,000 People Impacted by Krispy Kreme Data Breach

Krispy Kreme is sharing more information on the data breach resulting from the ransomware attack targeting the company in 2024.  The post 161,000 People Impacted by Krispy Kreme Data Breach appeared first on SecurityWeek. This article has been indexed from…

Hackers Access Legacy Systems in Oxford City Council Cyberattack

Personal data of former and current council workers, including election staff, may have been accessed by hackers. The post Hackers Access Legacy Systems in Oxford City Council Cyberattack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

New Campaigns Distribute Malware via Open Source Hacking Tools

Trend Micro and ReversingLabs uncovered over 100 GitHub accounts distributing malware embedded in open source hacking tools. The post New Campaigns Distribute Malware via Open Source Hacking Tools appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Chain IQ, UBS Data Stolen in Ransomware Attack

A ransomware group has claimed the theft of millions of files from procurement service provider Chain IQ and 19 other companies. The post Chain IQ, UBS Data Stolen in Ransomware Attack appeared first on SecurityWeek. This article has been indexed…

Krispy Kreme Confirms Data Breach After Ransomware Attack

Krispy Kreme is sending notifications to thousands of people impacted by the data breach that came to light at the end of 2024. The post Krispy Kreme Confirms Data Breach After Ransomware Attack appeared first on SecurityWeek. This article has…

Encryption Backdoors: The Security Practitioners’ View

After decades of failed attempts to access encrypted communications, governments are shifting from persuasion to coercion—security experts say the risks are too high. The post Encryption Backdoors: The Security Practitioners’ View appeared first on SecurityWeek. This article has been indexed…

High-Severity Vulnerabilities Patched by Cisco, Atlassian

Cisco has resolved a high-severity vulnerability in Meraki MX and Meraki Z devices. Atlassian pushed patches for multiple third-party dependencies. The post High-Severity Vulnerabilities Patched by Cisco, Atlassian appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Swedish Truck Giant Scania Investigating Hack

A hacker is selling allegedly valuable data stolen from Scania, but the truck maker believes impact is very limited. The post Swedish Truck Giant Scania Investigating Hack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Russian Hackers Bypass Gmail MFA With App-Specific Password Ruse

Russian hackers posed as US State Department staff and convinced targets to generate and give up Google app-specific passwords. The post Russian Hackers Bypass Gmail MFA With App-Specific Password Ruse appeared first on SecurityWeek. This article has been indexed from…

Russian Hackers Bypass Gmail MFA with App Specific Password Ruse

Russian hackers posed as US State Department staff and convinced targets to generate and give up Google app-specific passwords. The post Russian Hackers Bypass Gmail MFA with App Specific Password Ruse appeared first on SecurityWeek. This article has been indexed…

Critical Vulnerability Patched in Citrix NetScaler

Citrix has released patches for critical- and high-severity vulnerabilities in NetScaler and Secure Access Client and Workspace for Windows. The post Critical Vulnerability Patched in Citrix NetScaler appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Chrome 137 Update Patches High-Severity Vulnerabilities

Google has released a Chrome 137 update to resolve two memory bugs in the browser’s V8 and Profiler components. The post Chrome 137 Update Patches High-Severity Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Products

Veeam and BeyondTrust have resolved several vulnerabilities that could be exploited for remote code execution. The post Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Products appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Zyxel Firewall Vulnerability Again in Attacker Crosshairs

GreyNoise warns of a spike in exploitation attempts targeting a two-year-old vulnerability in Zyxel firewalls. The post Zyxel Firewall Vulnerability Again in Attacker Crosshairs appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Zyxel…

US Insurance Industry Warned of Scattered Spider Attacks

Google is warning insurance companies that Scattered Spider appears to have shifted its focus from the retail sector.  The post US Insurance Industry Warned of Scattered Spider Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Circumvent Raises $6 Million for Cloud Security Platform

Cloud security startup Circumvent has raised $6 million to develop a network of agents for autonomous prioritization and remediation. The post Circumvent Raises $6 Million for Cloud Security Platform appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Asus Armoury Crate Vulnerability Leads to Full System Compromise

A high-severity authorization bypass vulnerability in Asus Armoury Crate provides attackers with low-level system privileges. The post Asus Armoury Crate Vulnerability Leads to Full System Compromise appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Recent Langflow Vulnerability Exploited by Flodrix Botnet

A critical Langflow vulnerability tracked as CVE-2025-3248 has been exploited to ensnare devices in the Flodrix botnet. The post Recent Langflow Vulnerability Exploited by Flodrix Botnet appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Archetyp Dark Web Market Shut Down by Law Enforcement

The Archetyp Market drug marketplace has been targeted by law enforcement in an operation involving takedowns and arrests.  The post Archetyp Dark Web Market Shut Down by Law Enforcement appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Zoomcar Says Hackers Accessed Data of 8.4 Million Users

The Indian car sharing marketplace Zoomcar learned that its systems were hacked after a threat actor contacted employees.  The post Zoomcar Says Hackers Accessed Data of 8.4 Million Users appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Asheville Eye Associates Says 147,000 Impacted by Data Breach

Asheville Eye Associates says the personal information of 147,000 individuals was stolen in a November 2024 data breach. The post Asheville Eye Associates Says 147,000 Impacted by Data Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

240,000 Impacted by Data Breach at Eyecare Tech Firm Ocuco

The KillSec ransomware group has stolen hundreds of gigabytes of data from Ireland-based eyecare technology company Ocuco. The post 240,000 Impacted by Data Breach at Eyecare Tech Firm Ocuco appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Anubis Ransomware Packs a Wiper to Permanently Delete Files

The emerging Anubis ransomware becomes a major threat, permanently deleting user files and making recovery impossible. The post Anubis Ransomware Packs a Wiper to Permanently Delete Files appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Red Teaming AI: The Build Vs Buy Debate

A strong AI deployment starts with asking the right questions, mapping your risks, and thinking like an adversary — before it’s too late. The post Red Teaming AI: The Build Vs Buy Debate appeared first on SecurityWeek. This article has…

Canadian Airline WestJet Hit by Cyberattack

A cybersecurity incident at WestJet resulted in users experiencing interruptions when accessing the company’s application and website. The post Canadian Airline WestJet Hit by Cyberattack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

High-Severity Vulnerabilities Patched in Tenable Nessus Agent

Three high-severity Tenable Agent vulnerabilities could allow users to overwrite and delete files, or execute arbitrary code, with System privileges. The post High-Severity Vulnerabilities Patched in Tenable Nessus Agent appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

TeamFiltration Abused in Entra ID Account Takeover Campaign

Threat actors have abused the TeamFiltration pentesting framework to target over 80,000 Entra ID user accounts. The post TeamFiltration Abused in Entra ID Account Takeover Campaign appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday

Industry professionals comment on the Trump administration’s new executive order on cybersecurity.  The post Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Industry Reactions…

SimpleHelp Vulnerability Exploited Against Utility Billing Software Users

CISA warns that vulnerable SimpleHelp RMM instances have been exploited against a utility billing software provider’s customers. The post SimpleHelp Vulnerability Exploited Against Utility Billing Software Users appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Fog Ransomware Attack Employs Unusual Tools

Multiple legitimate, unusual tools were used in a Fog ransomware attack, including one employed by Chinese hacking group APT41. The post Fog Ransomware Attack Employs Unusual Tools appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…