Tag: SecurityWeek RSS Feed

GitLab Patches Critical Pipeline Execution Vulnerability

GitLab has released security updates to address a critical-severity vulnerability allowing an attacker to run pipelines as another user. The post GitLab Patches Critical Pipeline Execution Vulnerability appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…

UK Minister Warns Meta Over End-to-End Encryption

Britain’s interior minister warned Meta that out end-to-end encryption on its platforms must “not to come at a cost to our children’s safety”. The post UK Minister Warns Meta Over End-to-End Encryption appeared first on SecurityWeek. This article has been…

CrowdStrike to Acquire Application Intelligence Startup Bionic

The cash-and-stock transaction provides capabilities for CrowdStrike to beef up its enterprise cloud security portfolio. The post CrowdStrike to Acquire Application Intelligence Startup Bionic appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original…

HiddenLayer Raises Hefty $50M Round for AI Security Tech

Texas startup attracts major investor interest to build an MLMDR (machine learning detection and response) technology. The post HiddenLayer Raises Hefty $50M Round for AI Security Tech appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…

‘Cybersecurity Incident’ Hits ICC

The International Criminal Court was hit by what it called “anomalous activity” regarding its IT systems and that it was currently responding to this “cybersecurity incident.” The post ‘Cybersecurity Incident’ Hits ICC appeared first on SecurityWeek. This article has been…

Venafi Leverages Generative AI to Manage Machine Identities

Venafi launched a proprietary generative AI model to help with the mammoth, complex, and expanding problem of managing machine identities. The post Venafi Leverages Generative AI to Manage Machine Identities appeared first on SecurityWeek. This article has been indexed from…

Clorox Blames Damaging Cyberattack for Product Shortage

Clorox says the recent cyberattack has been contained, but production is still not fully restored and there is a short supply of products.  The post Clorox Blames Damaging Cyberattack for Product Shortage appeared first on SecurityWeek. This article has been…

Thousands of Juniper Appliances Vulnerable to New Exploit

VulnCheck details a new fileless exploit targeting a recent Junos OS vulnerability that thousands of devices have not been patched against. The post Thousands of Juniper Appliances Vulnerable to New Exploit  appeared first on SecurityWeek. This article has been indexed…

CISA Releases New Identity and Access Management Guidance

CISA has released new guidance on how federal agencies can integrate identity and access management into their ICAM architecture. The post CISA Releases New Identity and Access Management Guidance appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Pentagon’s 2023 Cyber Strategy Focuses on Helping Allies

The Pentagon has published an unclassified summary of its 2023 Cyber Strategy, outlining both offensive and defensive plans.  The post Pentagon’s 2023 Cyber Strategy Focuses on Helping Allies appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…

MGM Hackers Broadening Targets, Monetization Strategies

The financially motivated UNC3944 group that hacked MGM has hit at least 100 organizations, mainly in the US and Canada. The post MGM Hackers Broadening Targets, Monetization Strategies appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…

Caesars Confirms Ransomware Hack, Stolen Loyalty Program Database

The hijacked data includes driver’s license numbers and/or social security numbers from a Caesars Entertainment loyalty database. The post Caesars Confirms Ransomware Hack, Stolen Loyalty Program Database appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…

A One-Two Punch for Security ROI

Cost avoidance is a powerful way to kick-off ROI discussions. However, to quickly move beyond objections, shifting to a more tangible approach to calculate ROI can help. The post A One-Two Punch for Security ROI appeared first on SecurityWeek. This…

Kubernetes Vulnerability Leads to Remote Code Execution

A high-severity vulnerability can be exploited to execute code remotely on any Windows endpoint within a Kubernetes cluster. The post Kubernetes Vulnerability Leads to Remote Code Execution appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…

AuthMind Scores $8.5M Seed Funding for ITDR Tech

Maryland startup scores $8.5 million in seed-stage funding to compete in the Identity Threat Detection and Response (ITDR) category. The post AuthMind Scores $8.5M Seed Funding for ITDR Tech appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

How Next-Gen Threats Are Taking a Page From APTs

Cybercriminals are increasingly trying to find ways to get around security, detection, intelligence and controls as APTs start to merge with conventional cybercrime. The post How Next-Gen Threats Are Taking a Page From APTs appeared first on SecurityWeek. This article…

US Agencies Publish Cybersecurity Report on Deepfake Threats

CISA, FBI and NSA have published a cybersecurity report on deepfakes and recommendations for identifying and responding to such threats. The post US Agencies Publish Cybersecurity Report on Deepfake Threats appeared first on SecurityWeek. This article has been indexed from…

CISOs and Board Reporting – an Ongoing Problem

Boards often complain they receive overly-technical reports from management teams that fail to put governance in business and financial terms. The post CISOs and Board Reporting – an Ongoing Problem appeared first on SecurityWeek. This article has been indexed from…

Airbus Launches Investigation After Hacker Leaks Data

Airbus has launched an investigation after a hacker claimed to have breached the company’s systems and leaked some business documents. The post Airbus Launches Investigation After Hacker Leaks Data appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

macOS Info-Stealer Malware ‘MetaStealer’ Targeting Businesses

The MetaStealer macOS information stealer has been targeting businesses to exfiltrate keychain and other valuable information. The post macOS Info-Stealer Malware ‘MetaStealer’ Targeting Businesses appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original…

China Says No Law Banning iPhone Use in Govt Agencies

China said it was following media reports about suspected security issues with iPhones but insisted there was no ban on its officials using the devices The post China Says No Law Banning iPhone Use in Govt Agencies appeared first on SecurityWeek. This…

CISA Releases Open Source Software Security Roadmap

CISA details its plan to support the open source software ecosystem and secure the use of open source software within the federal government. The post CISA Releases Open Source Software Security Roadmap appeared first on SecurityWeek. This article has been…

SAP Patches Critical Vulnerability Impacting NetWeaver, S/4HANA

SAP has released patches for a critical vulnerability impacting multiple enterprise applications, including NetWeaver and S/4HANA. The post SAP Patches Critical Vulnerability Impacting NetWeaver, S/4HANA appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the…

SecurityWeek to Host Cyber AI & Automation Summit

Virtual conference will explore cybersecurity use-cases for AI technology and the race to protect LLM algorithms from adversarial use. The post SecurityWeek to Host Cyber AI & Automation Summit appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Intel Capital Bets on Zenity for Low-Code/No-Code Security

Israeli security startup Zenity banks $16.5 million in new venture capital funding to work on ‘low-code/no-code’ security technology. The post Intel Capital Bets on Zenity for Low-Code/No-Code Security appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…

Adobe Says Critical PDF Reader Zero-Day Being Exploited

Adobe raises an alarm for new in-the-wild zero-day attacks hitting users of its widely deployed Adobe Acrobat and Reader product. The post Adobe Says Critical PDF Reader Zero-Day Being Exploited  appeared first on SecurityWeek. This article has been indexed from…

Thousands of Code Packages Vulnerable to Repojacking Attacks

Despite GitHub’s efforts to prevent repository hijacking, cybersecurity researchers continue finding new attack methods, and thousands of code packages and millions of users could be at risk. Repojacking is a repository hijacking method that involves renamed GitHub usernames. If a…

Finding Your Way in Cloud Security

The next time you see CNAPP, CASB, WAAS, CSPM or many of the other phrases, it will be helpful to take a deep breath and realize enterprise security has never been a binary one or zero. The post Finding Your…

China-Linked ‘Redfly’ Group Targeted Power Grid

Symantec warns that the Redfly APT appears to be focusing exclusively on targeting critical national infrastructure organizations. The post China-Linked ‘Redfly’ Group Targeted Power Grid appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the…

US Marks 22 Years Since 9/11 Terrorist Attacks

One organization is hoping to transform the anniversary of 9/11 into a day of doing good. The post US Marks 22 Years Since 9/11 Terrorist Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the…

New Phishing Campaign Launched via Google Looker Studio

Check Point has observed a wave of phishing attacks launched via Google Looker Studio to steal credentials and funds from intended victims. The post New Phishing Campaign Launched via Google Looker Studio appeared first on SecurityWeek. This article has been…

Cisco ASA Zero-Day Exploited in Akira Ransomware Attacks

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks. The post Cisco ASA Zero-Day Exploited in Akira Ransomware Attacks appeared first on SecurityWeek. This article has…

Apple Patches Actively Exploited iOS, macOS Zero-Days

Apple pushes out an urgent point-update to its flagship iOS and macOS platforms to fix a pair of security defects being exploited in the wild. The post Apple Patches Actively Exploited iOS, macOS Zero-Days appeared first on SecurityWeek. This article…

Webinar Today: Scaling Software Supply Chain Security

Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain. The post Webinar Today: Scaling Software Supply Chain Security appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

CISA Releases Guidance on Adopting DDoS Mitigations

CISA has released new guidance to help federal agencies decide upon and prioritize DDoS mitigations based on mission and reputational impact. The post CISA Releases Guidance on Adopting DDoS Mitigations appeared first on SecurityWeek. This article has been indexed from…

Cisco Patches Critical Vulnerability in BroadWorks Platform

Cisco has released patches for CVE-2023-20238, a critical authentication bypass vulnerability in the BroadWorks Application Delivery Platform. The post Cisco Patches Critical Vulnerability in BroadWorks Platform appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…

Cash-Strapped IronNet Faces Bankruptcy Options

It appears to be the end of the road for IronNet, the once-promising network security play founded by former NSA director General Keith Alexander. The post Cash-Strapped IronNet Faces Bankruptcy Options appeared first on SecurityWeek. This article has been indexed…