www.securityweek.com Open in urlscan Pro
2606:4700:20::6818:a003  Public Scan

URL: https://www.securityweek.com/
Submission: On May 15 via api from IE — Scanned from DE

Form analysis 3 forms found in the DOM

GET https://www.securityweek.com/

<form method="get" id="zox-search-form" action="https://www.securityweek.com/">
  <input type="text" name="s" id="zox-search-input" value="Search" onfocus="if (!window.__cfRLUnblockHandlers) return false; if (this.value == &quot;Search&quot;) { this.value = &quot;&quot;; }"
    onblur="if (!window.__cfRLUnblockHandlers) return false; if (this.value == &quot;Search&quot;) { this.value = &quot;&quot;; }">
  <input type="submit" id="zox-search-submit" value="Search">
</form>

Name: ccoptinPOST https://visitor.constantcontact.com/d.jsp

<form class="sw-newsletter-cc" style="" method="post" target="_blank" action="https://visitor.constantcontact.com/d.jsp" name="ccoptin">
  <input type="hidden" value="1102592012458" name="m">
  <input type="hidden" value="oi" name="p">
  <div class="form-item">
    <input type="text" class="form-text required" value="" placeholder="Business Email Address..." size="60" name="ea" maxlength="128">
    <input type="submit" class="submit" value="Subscribe" name="go">
  </div>
</form>

Name: ccoptinPOST https://visitor.constantcontact.com/d.jsp

<form class="sw-newsletter-cc" style="" method="post" target="_blank" action="https://visitor.constantcontact.com/d.jsp" name="ccoptin">
  <input type="hidden" value="1102592012458" name="m">
  <input type="hidden" value="oi" name="p">
  <div class="form-item">
    <input type="text" class="form-text required" value="" placeholder="Business Email Address..." size="60" name="ea" maxlength="128">
    <input type="submit" class="submit" value="Subscribe" name="go">
  </div>
</form>

Text Content

SECURITYWEEK NETWORK:

 * Cybersecurity News
 * Webcasts
 * Virtual Events


ICS:

 * ICS Cybersecurity Conference

 * Malware & Threats
   * Cyberwarfare
   * Cybercrime
   * Data Breaches
   * Fraud & Identity Theft
   * Nation-State
   * Ransomware
   * Vulnerabilities
 * Security Operations
   * Threat Intelligence
   * Incident Response
   * Tracking & Law Enforcement
 * Security Architecture
   * Application Security
   * Cloud Security
   * Endpoint Security
   * Identity & Access
   * IoT Security
   * Mobile & Wireless
   * Network Security
 * Risk Management
   * Cyber Insurance
   * Data Protection
   * Privacy & Compliance
   * Supply Chain Security
 * CISO Strategy
   * Cyber Insurance
   * CISO Conversations
   * CISO Forum
 * ICS/OT
   * Industrial Cybersecurity
   * ICS Cybersecurity Conference
 * Funding/M&A
   * Cybersecurity Funding
   * M&A Tracker

 * Cybersecurity News
 * Webcasts
 * Virtual Events

 * ICS Cybersecurity Conference

Connect with us
 * 
 * 
 * 

Hi, what are you looking for?





SECURITYWEEK

 * Malware & Threats
   * Cyberwarfare
   * Cybercrime
   * Data Breaches
   * Fraud & Identity Theft
   * Nation-State
   * Ransomware
   * Vulnerabilities
 * Security Operations
   * Threat Intelligence
   * Incident Response
   * Tracking & Law Enforcement
 * Security Architecture
   * Application Security
   * Cloud Security
   * Endpoint Security
   * Identity & Access
   * IoT Security
   * Mobile & Wireless
   * Network Security
 * Risk Management
   * Cyber Insurance
   * Data Protection
   * Privacy & Compliance
   * Supply Chain Security
 * CISO Strategy
   * Cyber Insurance
   * CISO Conversations
   * CISO Forum
 * ICS/OT
   * Industrial Cybersecurity
   * ICS Cybersecurity Conference
 * Funding/M&A
   * Cybersecurity Funding
   * M&A Tracker



LATEST CYBERSECURITY NEWS


SENATORS URGE $32 BILLION IN EMERGENCY SPENDING ON AI AFTER FINISHING YEARLONG
REVIEW

The group recommends that Congress draft emergency spending legislation to boost
U.S. investments in artificial intelligence, including new R&D and testing
standards to understand the technology’s potential harms.


ICS PATCH TUESDAY: ADVISORIES PUBLISHED BY SIEMENS, ROCKWELL, MITSUBISHI
ELECTRIC

Several ICS vendors released advisories on Tuesday to inform customers about
vulnerabilities found in their products. 


VERMONT LEGISLATURE PASSES ONE OF THE STRONGEST DATA PRIVACY MEASURES IN THE
COUNTRY

Vermont legislature passed a bill that prohibits the sale of sensitive data,
such as social security and drivers’ license numbers, financial or health
information.


MICROSOFT WARNS OF ACTIVE ZERO-DAY EXPLOITATION, PATCHES 60 WINDOWS
VULNERABILITIES

Patch Tuesday: Microsoft documents 60 security flaws in multiple software
products and flags an actively exploited Windows zero-day for urgent attention.


ADOBE PATCHES CRITICAL FLAWS IN READER, ACROBAT

Adobe documents multiple code execution flaws in a wide range of products,
including the widely deployed Adobe Acrobat and Reader software.


SAP PATCHES CRITICAL VULNERABILITIES IN CX COMMERCE, NETWEAVER

SAP has released 14 new and three updated security notes on its May 2024
Security Patch Day.


VMWARE PATCHES VULNERABILITIES EXPLOITED AT PWN2OWN 2024

VMware has patched three vulnerabilities exploited earlier this year at the
Pwn2Own hacking competition.


HACKER CONVERSATIONS: RON REITER, AND THE MAKING OF A PROFESSIONAL HACKER

Ron Reiter was a childhood hacker in Israel. He was recruited into the IDF’s
elite Unit 8200 for his military service. Now he is CTO and co-founder of
cybersecurity firm Sentra.


ATTACKERS USE DNS TUNNELING TO TRACK VICTIM ACTIVITY, SCAN NETWORKS

Threat actors are using DNS tunneling to track victims’ interaction with spam
and to scan network infrastructures.


GOOGLE PATCHES SECOND CHROME ZERO-DAY IN ONE WEEK

Google has patched CVE-2024-4761, the second exploited vulnerability addressed
by the company within one week.


STUDENT, PERSONNEL INFORMATION STOLEN IN CITY OF HELSINKI CYBERATTACK

The City of Helsinki says usernames, email addresses, and personal information
was stolen in a recent cyberattack.

PEOPLE ON THE MOVE

PR and marketing firm FleishmanHillard named Scott Radcliffe as the agency’s
global director of cybersecurity.

Portnox, a provider of zero trust access control solutions, announced that
Joseph Rodriguez has joined the company as Chief Revenue Officer.

Cybersecurity awareness training firm NINJIO has appointed Jon Dion as its Chief
Revenue Officer.

IAM firm Device Authority has announced the appointment of Richard Seward as its
VP of Product Management.

Cohesity has hired former DoD Chief Digital and Artificial Intelligence Officer
(CDAO) Dr. Craig Martell as Chief Technology Officer.

More People On The Move


MICROSOFT WARNS OF ACTIVE ZERO-DAY EXPLOITATION, PATCHES 60 WINDOWS
VULNERABILITIES

Patch Tuesday: Microsoft documents 60 security flaws in multiple software
products and flags an actively exploited Windows zero-day for urgent attention.


ZSCALER CONFIRMS ONLY ISOLATED TEST SERVER WAS HACKED

Zscaler has completed its investigation into the recent hacking claims and found
that only an isolated test environment was compromised.


NATO DRAWS A CYBER RED LINE IN TENSIONS WITH RUSSIA

Weakening liberal democracies and weakening the NATO alliance are conjoined in
the hybrid war that Russia is conducting against Ukraine.

TOP CYBERSECURITY HEADLINES


SENATORS URGE $32 BILLION IN EMERGENCY SPENDING ON AI AFTER FINISHING YEARLONG
REVIEW

The group recommends that Congress draft emergency spending legislation to boost
U.S. investments in artificial intelligence, including new R&D and testing
standards to understand…


ICS PATCH TUESDAY: ADVISORIES PUBLISHED BY SIEMENS, ROCKWELL, MITSUBISHI
ELECTRIC

Several ICS vendors released advisories on Tuesday to inform customers about
vulnerabilities found in their products. 


VERMONT LEGISLATURE PASSES ONE OF THE STRONGEST DATA PRIVACY MEASURES IN THE
COUNTRY

Vermont legislature passed a bill that prohibits the sale of sensitive data,
such as social security and drivers’ license numbers, financial or health
information.


MICROSOFT WARNS OF ACTIVE ZERO-DAY EXPLOITATION, PATCHES 60 WINDOWS
VULNERABILITIES

Patch Tuesday: Microsoft documents 60 security flaws in multiple software
products and flags an actively exploited Windows zero-day for urgent attention.

SECURITYWEEK INDUSTRY EXPERTS


SHIELDS UP: HOW TO MINIMIZE RANSOMWARE EXPOSURE

Organizations need to look beyond preventive measures when it comes to dealing
with today’s ransomware threats and invest in ransomware response.

Torsten George Read more


FROM WARNINGS TO ACTION: PREPARING AMERICA’S INFRASTRUCTURE FOR IMMINENT CYBER
THREATS

As cyber threats grow more sophisticated, America cannot afford complacency. The
time for decisive action and enhanced cyber resilience is now.

Danelle Au Read more


BUILDING THE RIGHT VENDOR ECOSYSTEM – A GUIDE TO MAKING THE MOST OF RSA
CONFERENCE

As you look to navigate RSA Conference, with so many vendors, approaches and
solutions, how do you know what solutions you should be investing in?

Marc Solomon Read more


WHY USING MICROSOFT COPILOT COULD AMPLIFY EXISTING DATA QUALITY AND PRIVACY
ISSUES

Microsoft provides an easy and logical first step into GenAI for many
organizations, but beware of the pitfalls.

Alastair Paterson Read more


BEYOND THE BUZZ: RETHINKING ALCOHOL AS A CYBERSECURITY BONDING RITUAL

Jennifer Leggio makes the case for more alcohol-free networking events at
conferences, and community-building opportunities for sober individuals working
in cybersecurity.

Jennifer Leggio Read more
More Expert Insights


TRENDING


MICROSOFT WARNS OF ACTIVE ZERO-DAY EXPLOITATION, PATCHES 60 WINDOWS
VULNERABILITIES


APPLE PATCH DAY: CODE EXECUTION FLAWS IN IPHONES, IPADS, MACOS


NATO DRAWS A CYBER RED LINE IN TENSIONS WITH RUSSIA


EXPLOITED CHROME ZERO-DAY PATCHED BY GOOGLE


$2.5 MILLION OFFERED AT UPCOMING ‘MATRIX CUP’ CHINESE HACKING CONTEST 


BLACK BASTA RANSOMWARE HIT OVER 500 ORGANIZATIONS


EUROPOL INVESTIGATING BREACH AFTER HACKER OFFERS TO SELL CLASSIFIED DATA


HEALTHCARE GIANT ASCENSION HACKED, HOSPITALS DIVERTING EMERGENCY SERVICE




DAILY BRIEFING NEWSLETTER

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest
threats, trends, and technology, along with insightful columns from industry
experts.


 * Facebook
 * Twitter
 * LinkedIn
 * RSS Feed


WEBINAR: CIEM CHAT: HOW TO REDUCE CLOUD IDENTITY RISK

March 26, 2024

Join the session as we discuss the challenges and best practices for
cybersecurity leaders managing cloud identities.

Register


VIRTUAL EVENT: RANSOMWARE RESILIENCE & RECOVERY SUMMIT

April 17, 2024

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to
plan, prepare, and recover from a ransomware incident.

Register


 * CYBERSECURITY M&A ROUNDUP: 33 DEALS ANNOUNCED IN APRIL 2024


 * DARKTRACE TO BE TAKEN PRIVATE IN $5.3 BILLION SALE TO THOMA BRAVO


 * KNOWBE4 PLANS TO ACQUIRE EGRESS FOR EMAIL SECURITY TECH


 * ARMIS ACQUIRES SILK SECURITY FOR $150 MILLION


 * WIZ ACQUIRES GEM SECURITY, PUSHES SECURITY TOOLS CONSOLIDATION


 * SECURITYWEEK CYBER INSIGHTS 2024 SERIES


 * CYBER INSIGHTS 2024: A DIRE YEAR FOR CISOS?


 * CYBER INSIGHTS 2024: OT, ICS AND IIOT


 * CYBER INSIGHTS 2024: APIS – A CLEAR, PRESENT, AND FUTURE DANGER


 * CYBER INSIGHTS 2024: QUANTUM AND THE CRYPTOPOCALYPSE


 * CYBER INSIGHTS 2024: ARTIFICIAL INTELLIGENCE


 * HACKER CONVERSATIONS: RON REITER, AND THE MAKING OF A PROFESSIONAL HACKER


 * HACKER CONVERSATIONS: KEVIN O’CONNOR, FROM CHILDHOOD HACKER TO NSA OPERATIVE


 * HACKER CONVERSATIONS: STEPHANIE ‘SNOW’ CARRUTHERS, CHIEF PEOPLE HACKER AT IBM
   X-FORCE RED


 * HACKER CONVERSATIONS: ROB DYKE ON LEGAL BULLYING OF GOOD FAITH RESEARCHERS


 * HACKER CONVERSATIONS: HD MOORE AND THE LINE BETWEEN BLACK AND WHITE


 * CISO CONVERSATIONS: LINKEDIN’S GEOFF BELKNAP AND META’S GUY ROSEN


 * CISO CONVERSATIONS: NICK MCKENZIE (BUGCROWD) AND CHRIS EVANS (HACKERONE)


 * SECURITYWEEK CYBER INSIGHTS 2024 SERIES


 * CYBER INSIGHTS 2024: A DIRE YEAR FOR CISOS?


 * CISO CONVERSATIONS: THE LEGAL SECTOR WITH ALYSSA MILLER AT EPIQ AND MARK
   WALMSLEY AT FRESHFIELDS

UPCOMING CYBERSECURITY EVENTS

The AI Risk Summit brings together security and risk management executives, AI
researchers, policy makers, software developers and influential business and
government stakeholders. [June 25-26, Ritz-Carlton, Half Moon Bay, CA]

Learn More

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to
plan, prepare, and recover from a ransomware incident.

Learn More

Designed for senior level cybersecurity leaders to discuss, share and learn
innovative information security and risk management strategies, SecurityWeek’s
CISO Forum, will take place June 25-26 at the Ritz-Carlton, Half Moon Bay, CA

Learn More

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit dives into
Threat hunting tools and frameworks, and explores the value of threat
intelligence data in the defender’s security stack.

Learn More

VULNERABILITIES


 * MICROSOFT WARNS OF ACTIVE ZERO-DAY EXPLOITATION, PATCHES 60 WINDOWS
   VULNERABILITIES
   
   Patch Tuesday: Microsoft documents 60 security flaws in multiple software
   products and flags an actively exploited Windows zero-day for urgent
   attention. (May 14, 2024)
   
   


 * ADOBE PATCHES CRITICAL FLAWS IN READER, ACROBAT
   
   Adobe documents multiple code execution flaws in a wide range of products,
   including the widely deployed Adobe Acrobat and Reader software. (May 14,
   2024)
   
   


 * SAP PATCHES CRITICAL VULNERABILITIES IN CX COMMERCE, NETWEAVER
   
   SAP has released 14 new and three updated security notes on its May 2024
   Security Patch Day. (May 14, 2024)
   
   


 * VMWARE PATCHES VULNERABILITIES EXPLOITED AT PWN2OWN 2024
   
   VMware has patched three vulnerabilities exploited earlier this year at the
   Pwn2Own hacking competition. (May 14, 2024)
   
   

CYBERCRIME


 * CRIMINAL USE OF AI GROWING, BUT LAGS BEHIND DEFENDERS
   
   When not scamming other criminals, criminals are concentrating on the use of
   mainstream AI products rather than developing their own AI systems. (May 9,
   2024)
   
   


 * ZSCALER INVESTIGATES HACKING CLAIMS AFTER DATA OFFERED FOR SALE
   
   Zscaler says its customer, production and corporate environments are not
   impacted after a notorious hacker offers to sell access. (May 9, 2024)
   
   


 * GERMANY RECALLS ITS AMBASSADOR IN RUSSIA FOR A WEEK IN PROTEST OVER A HACKER
   ATTACK
   
   Germany recalled its ambassador to Russia for a week of consultations in
   Berlin following an alleged hacker attack on Chancellor Olaf Scholz’s party.
   (May 7, 2024)
   
   


 * FRENCH CYBERWARRIORS READY TO TEST THEIR DEFENSE AGAINST HACKERS AND MALWARE
   DURING THE OLYMPICS
   
   Vincent Strubel, who heads France’s national cybersecurity agency, called the
   cyberthreats level facing the Olympic Games unprecedented. (May 4, 2024)
   
   


SENATORS URGE $32 BILLION IN EMERGENCY SPENDING ON AI AFTER FINISHING YEARLONG
REVIEW

The group recommends that Congress draft emergency spending legislation to boost
U.S. investments in artificial intelligence, including new R&D and testing
standards to understand the technology's potential harms.

May 15, 2024


ICS PATCH TUESDAY: ADVISORIES PUBLISHED BY SIEMENS, ROCKWELL, MITSUBISHI
ELECTRIC

Several ICS vendors released advisories on Tuesday to inform customers about
vulnerabilities found in their products. 

May 15, 2024


VERMONT LEGISLATURE PASSES ONE OF THE STRONGEST DATA PRIVACY MEASURES IN THE
COUNTRY

Vermont legislature passed a bill that prohibits the sale of sensitive data,
such as social security and drivers’ license numbers, financial or health
information.

May 14, 2024


MICROSOFT WARNS OF ACTIVE ZERO-DAY EXPLOITATION, PATCHES 60 WINDOWS
VULNERABILITIES

Patch Tuesday: Microsoft documents 60 security flaws in multiple software
products and flags an actively exploited Windows zero-day for urgent attention.

May 14, 2024


ADOBE PATCHES CRITICAL FLAWS IN READER, ACROBAT

Adobe documents multiple code execution flaws in a wide range of products,
including the widely deployed Adobe Acrobat and Reader software.

May 14, 2024


SAP PATCHES CRITICAL VULNERABILITIES IN CX COMMERCE, NETWEAVER

SAP has released 14 new and three updated security notes on its May 2024
Security Patch Day.

May 14, 2024


VMWARE PATCHES VULNERABILITIES EXPLOITED AT PWN2OWN 2024

VMware has patched three vulnerabilities exploited earlier this year at the
Pwn2Own hacking competition.

May 14, 2024


HACKER CONVERSATIONS: RON REITER, AND THE MAKING OF A PROFESSIONAL HACKER

Ron Reiter was a childhood hacker in Israel. He was recruited into the IDF’s
elite Unit 8200 for his military service. Now he is CTO and co-founder of
cybersecurity firm Sentra.

May 14, 2024


ATTACKERS USE DNS TUNNELING TO TRACK VICTIM ACTIVITY, SCAN NETWORKS

Threat actors are using DNS tunneling to track victims’ interaction with spam
and to scan network infrastructures.

May 14, 2024


GOOGLE PATCHES SECOND CHROME ZERO-DAY IN ONE WEEK

Google has patched CVE-2024-4761, the second exploited vulnerability addressed
by the company within one week.

May 14, 2024


STUDENT, PERSONNEL INFORMATION STOLEN IN CITY OF HELSINKI CYBERATTACK

The City of Helsinki says usernames, email addresses, and personal information
was stolen in a recent cyberattack.

May 14, 2024


MITRE EMB3D THREAT MODEL OFFICIALLY RELEASED

MITRE announced the public availability of the EMB3D threat model for embedded
devices used in critical infrastructure.

May 14, 2024


FCC WARNS OF ‘ROYAL TIGER’ ROBOCALL SCAMMERS

The FCC has issued a public notice on robocall scammer group ‘Royal Tiger’, the
first designated threat actor.

May 14, 2024


ZSCALER CONFIRMS ONLY ISOLATED TEST SERVER WAS HACKED

Zscaler has completed its investigation into the recent hacking claims and found
that only an isolated test environment was compromised.

May 14, 2024


APPLE PATCH DAY: CODE EXECUTION FLAWS IN IPHONES, IPADS, MACOS

Apple documents another zero-day flaw being exploited on older iPhones and
documents security problems in macOS, iOS and iPadOS.

May 13, 2024


CHINA AND US ENVOYS WILL HOLD FIRST TOP-LEVEL DIALOGUE ON ARTIFICIAL
INTELLIGENCE

China’s official Xinhua news agency said the two sides would take up issues
including the technological risks of AI and global governance.

May 13, 2024
More Articles
Page 1 of 182312345Next ›Last »

The leading global conference series for Operations, Control Systems and IT/OT
Security professionals to connect on SCADA, DCS PLC and field controller
cybersecurity.

Learn More

APPLICATION SECURITY


APPLICATION SECURITY


ADOBE ADDS CONTENT CREDENTIALS AND FIREFLY TO BUG BOUNTY PROGRAM

Adobe is providing incentives for bug bounty hackers to report security flaws in
its implementation of Content Credentials and Adobe Firefly.

Ionut ArghireMay 1, 2024


APPLICATION SECURITY


SAP APPLICATIONS INCREASINGLY IN ATTACKER CROSSHAIRS, REPORT SHOWS


APPLICATION SECURITY


MIGGO SECURITY GETS $7.5 MILLION SEED FUNDING TO BUILD ADR TECHNOLOGY


APPLICATION SECURITY


NIGHTVISION RAISES $5.4 MILLION FOR APPLICATION SECURITY TESTING

CLOUD SECURITY


CLOUD SECURITY


WIZ RAISES $1 BILLION AT $12 BILLION VALUATION

Cloud security giant Wiz has raised $1 billion, which brings the total funding
to $1.9 billion, at a valuation of $12 billion.

Eduard KovacsMay 7, 2024


ARTIFICIAL INTELLIGENCE


GOOGLE DEBUTS NEW SECURITY PRODUCTS, HYPING AI AND MANDIANT EXPERTISE


CISO STRATEGY


MICROSOFT OVERHAULS CYBERSECURITY STRATEGY AFTER SCATHING CSRB REPORT


CLOUD SECURITY


LAYERX RAISES $26 MILLION FOR BROWSER SECURITY PLATFORM

ICS/OT


ICS/OT


ICS PATCH TUESDAY: ADVISORIES PUBLISHED BY SIEMENS, ROCKWELL, MITSUBISHI
ELECTRIC

Several ICS vendors released advisories on Tuesday to inform customers about
vulnerabilities found in their products. 

Eduard Kovacs13 mins ago


ICS/OT


CINTERION MODEM FLAWS POSE RISK TO MILLIONS OF DEVICES IN INDUSTRIAL, OTHER
SECTORS


FUNDING/M&A


TXONE NETWORKS SCORES $51M SERIES B EXTENSION


ICS/OT


FROM WARNINGS TO ACTION: PREPARING AMERICA’S INFRASTRUCTURE FOR IMMINENT CYBER
THREATS

 * 
 * 
 * 


POPULAR TOPICS

 * Cybersecurity News
 * Industrial Cybersecurity


SECURITY COMMUNITY

 * Virtual Cybersecurity Events
 * Webcast Library
 * CISO Forum
 * AI Risk Summit
 * ICS Cybersecurity Conference
 * Cybersecurity Newsletters


STAY INTOUCH

 * Cyber Weapon Discussion Group
 * RSS Feed
 * Security Intelligence Group
 * Follow SecurityWeek on LinkedIn


ABOUT SECURITYWEEK

 * Advertising
 * Event Sponsorships
 * Writing Opportunities
 * Feedback/Contact Us


NEWS TIPS

Got a confidential news tip? We want to hear from you.

Submit Tip


ADVERTISING

Reach a large audience of enterprise cybersecurity professionals

Contact Us


DAILY BRIEFING NEWSLETTER

Subscribe to the SecurityWeek Daily Briefing and get the latest content
delivered to your inbox.


 * Privacy Policy

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights
Reserved.












Close