New York identity management startup raises $36 million in an unusually large seed round co-led by Team8 and Intel Capital.
SecurityWeek’s Cyber Insights 2025 examines expert opinions on the expected evolution of more than a dozen areas of ...
CISA and other Western security agencies have shared guidance for OT owners and operators when procuring products.
A threat actor has been observed abusing compromised AWS keys to encrypt data in S3 buckets and demand a ransom payment in exchange for the encryption keys, cybersecurity firm Halcyon reports. As part ...
Attackers have been exploiting a second vulnerability in BeyondTrust’s remote management solutions, CISA warns.
Ivanti VPNs are still exposed to attacks exploiting a recent vulnerability tracked as CVE-2025-0282 and Nominet has been ...
Attackers are exploiting a critical vulnerability in Aviatrix Controller to execute arbitrary code in AWS cloud environments.
Infostealer malware allowed threat actors to compromise Telefonica employees’ credentials and access the company’s internal ticketing system.
Enterprise software maker SAP on Tuesday announced the release of 14 new security notes as part of its January 2025 Patch Day ...
According to a whitepaper from Redmond’s AI red team, tools like its open source PyRIT (Python Risk Identification Toolkit) ...
A fake proof-of-concept (PoC) exploit for a recent LDAP vulnerability distributes information stealer malware.
The US Justice Department has announced charges against three Russians for operating the Blender and Sinbad cryptocurrency mixers.