Tag: securityweek

Chrome 132 Patches 16 Vulnerabilities

Google has released Chrome 132 with fixes for 16 vulnerabilities, including multiple high-severity security defects. The post Chrome 132 Patches 16 Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Chrome 132 Patches…

Nvidia, Zoom, Zyxel Patch High-Severity Vulnerabilities

Nvidia, Zoom, and Zyxel have released patches for multiple high-severity vulnerabilities across their products. The post Nvidia, Zoom, Zyxel Patch High-Severity Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Nvidia, Zoom, Zyxel…

Ivanti Patches Critical Vulnerabilities in Endpoint Manager

Ivanti has released patches for multiple vulnerabilities in Endpoint Manager (EPM), including four critical-severity flaws. The post Ivanti Patches Critical Vulnerabilities in Endpoint Manager appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Ivanti…

Adobe: Critical Code Execution Flaws in Photoshop

Patch Tuesday: Adobe ships patches for more than a dozen security defects in a wide range of software products. The post Adobe: Critical Code Execution Flaws in Photoshop appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Microsoft Patches Trio of Exploited Windows Hyper-V Zero-Days

Patch Tuesday: Microsoft has rushed out fixes for a trio of already-exploited zero-day vulnerabilities in the Windows Hyper-V platform. The post Microsoft Patches Trio of Exploited Windows Hyper-V Zero-Days appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

How to Eliminate “Shadow AI” in Software Development

With a security-first culture fully in play, developers will view the protected deployment of AI as a marketable skill, and respond accordingly. The post How to Eliminate “Shadow AI” in Software Development appeared first on SecurityWeek. This article has been…

Cyber Insights 2025: Cyber Threat Intelligence

Cyber threat intelligence can inform decisions but is a complex issue. Where it is complete and accurate it is a huge boon. The post Cyber Insights 2025: Cyber Threat Intelligence appeared first on SecurityWeek. This article has been indexed from…

SAP Patches Critical Vulnerabilities in NetWeaver

SAP has released 14 security notes on January 2025 Patch Day, including two addressing critical vulnerabilities in NetWeaver. The post SAP Patches Critical Vulnerabilities in NetWeaver appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

CISA Warns of Second BeyondTrust Vulnerability Exploited in Attacks

Attackers have been exploiting a second vulnerability in BeyondTrust’s remote management solutions, CISA warns. The post CISA Warns of Second BeyondTrust Vulnerability Exploited in Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Infostealer Infections Lead to Telefonica Ticketing System Breach

Infostealer malware allowed threat actors to compromise Telefonica employees’ credentials and access the company’s internal ticketing system. The post Infostealer Infections Lead to Telefonica Ticketing System Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Emerging FunkSec Ransomware Developed Using AI

Developed with the help of AI, the emerging FunkSec ransomware claimed over 80 victims in December 2024. The post Emerging FunkSec Ransomware Developed Using AI appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Banshee macOS Malware Expands Targeting

The latest version of the Banshee macOS information stealer no longer checks if the infected systems have the Russian language installed. The post Banshee macOS Malware Expands Targeting appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Darktrace to Acquire Incident Investigation Firm Cado Security

Darktrace has announced the proposed acquisition of UK-based incident investigation firm Cado Security, reportedly for up to $100 million.  The post Darktrace to Acquire Incident Investigation Firm Cado Security appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

GFI KerioControl Firewall Vulnerability Exploited in the Wild

Threat actors are exploiting a recent GFI KerioControl firewall vulnerability that leads to remote code execution. The post GFI KerioControl Firewall Vulnerability Exploited in the Wild appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Thousands Impacted by Casio Data Breach

Casio has completed its investigation into the data breach caused by a recent ransomware attack and found that thousands of individuals are impacted. The post Thousands Impacted by Casio Data Breach appeared first on SecurityWeek. This article has been indexed…

Cybersecurity Funding Reached $9.5 Billion in 2024: Report

Cybersecurity firms raised $9.5 billion in over 300 funding rounds in 2024, with Wiz scoring the largest investment at $1 billion. The post Cybersecurity Funding Reached $9.5 Billion in 2024: Report appeared first on SecurityWeek. This article has been indexed…

Chrome 131, Firefox 134 Updates Patch High-Severity Vulnerabilities

Chrome and Firefox updates released this week resolve high-severity vulnerabilities in the two popular browsers. The post Chrome 131, Firefox 134 Updates Patch High-Severity Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Veracode Targets Malicious Code Threats With Phylum Acquisition

The deal includes certain Phylum assets, including its malicious package analysis, detection, and mitigation technology.  The post Veracode Targets Malicious Code Threats With Phylum Acquisition appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Veracode…

Veracode Targets Malicious Code Threats with Phylum Acquisition

The deal includes certain Phylum assets, including its malicious package analysis, detection, and mitigation technology.  The post Veracode Targets Malicious Code Threats with Phylum Acquisition appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Veracode…

Trolley Problem, Safety Versus Security of Generative AI

The only way to advance AI safety is to increase human interactions, human values and societal governance to promote a reinforced human feedback loop, much like we do with traditional AI training methods. The post Trolley Problem, Safety Versus Security…

Dell, HPE, MediaTek Patch Vulnerabilities in Their Products

MediaTek, HPE and Dell release advisories to inform customers about potentially serious vulnerabilities found and patched in their products. The post Dell, HPE, MediaTek Patch Vulnerabilities in Their Products appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Anticipating the Cyber Frontier: Top Predictions for 2025

The cybersecurity landscape in 2025 will demand a careful balance between robust defense mechanisms and adaptive resilience. The post Anticipating the Cyber Frontier: Top Predictions for 2025 appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Code Execution Flaw Found in Nuclei Vulnerability Scanner

A vulnerability in Nuclei’s template signature verification system could have allowed attackers to execute arbitrary code. The post Code Execution Flaw Found in Nuclei Vulnerability Scanner appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Tenable Disables Nessus Agents Over Faulty Updates

Tenable has disabled two Nessus scanner agent versions after a differential plugin update caused the agents to go offline. The post Tenable Disables Nessus Agents Over Faulty Updates appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Tenable CEO Amit Yoran Dead at 54

Tenable CEO and cybersecurity industry veteran Amit Yoran has passed away at the age of 54 after a battle with cancer. The post Tenable CEO Amit Yoran Dead at 54 appeared first on SecurityWeek. This article has been indexed from…

FireScam Android Malware Packs Infostealer, Spyware Capabilities

The FireScam Android infostealer monitors app notifications and harvests credentials and financial data and sends it to a Firebase database. The post FireScam Android Malware Packs Infostealer, Spyware Capabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

US Arrests Army Soldier Over AT&T, Verizon Hacking

US soldier Cameron John Wagenius was arrested and charged over his suspected connection to presidential phone records leaks. The post US Arrests Army Soldier Over AT&T, Verizon Hacking appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Four-Faith Industrial Router Vulnerability Exploited in Attacks

Threat actors are exploiting a command injection vulnerability in Four-Faith industrial routers to deploy a reverse shell. The post Four-Faith Industrial Router Vulnerability Exploited in Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Several Chrome Extensions Compromised in Supply Chain Attack

Cyberhaven and other Chrome extensions were compromised in a supply chain attack targeting Facebook advertising users. The post Several Chrome Extensions Compromised in Supply Chain Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Cisco Confirms Authenticity of Data After Second Leak

Cisco has confirmed that 4 Gb of data leaked by a hacker is authentic and related to a recently disclosed security incident.  The post Cisco Confirms Authenticity of Data After Second Leak appeared first on SecurityWeek. This article has been…

The Intersection of AI and OSINT: Advanced Threats On The Horizon

Artificial Intelligence (A) is revolutionizing intelligence gathering, empowering cybersecurity defenders, and amplifying threat actor capabilities. The post The Intersection of AI and OSINT: Advanced Threats On The Horizon appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Adobe Patches ColdFusion Flaw at High Risk of Exploitation

Adobe has released patches for a high-severity ColdFusion vulnerability for which proof-of-concept (PoC) code exists. The post Adobe Patches ColdFusion Flaw at High Risk of Exploitation appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Sophos Patches Critical Firewall Vulnerabilities

Sophos has released patches for a critical-severity firewall vulnerability that could lead to remote code execution. The post Sophos Patches Critical Firewall Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Sophos Patches…

Botnet of 190,000 BadBox-Infected Android Devices Discovered

Bitsight has discovered a BadBox botnet consisting of over 190,000 Android devices, mainly Yandex smart TVs and Hisense smartphones. The post Botnet of 190,000 BadBox-Infected Android Devices Discovered appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…