Security Week

Cybersecurity News, Insights & Analysis
  1. From service accounts to AI-driven processes, identity is evolving faster than most security programs can adapt. Discover strategies for reducing risk and regaining control.

    The post Webinar Today: Securing Identity Across Humans, Machines and AI appeared first on SecurityWeek.

  2. Successful exploitation of the flaws could lead to code execution, server-side request forgery attacks, and denial-of-service conditions.

    The post Cisco Patches High-Severity Vulnerabilities in Enterprise Products appeared first on SecurityWeek.

  3. Attackers could inject prompts into a GitHub issue and take over the AI agent designed to automatically triage the issue.

    The post Gemini CLI Vulnerability Could Have Led to Code Execution, Supply Chain Attack appeared first on SecurityWeek.

  4. Dragos has published a report describing how threat actors used Claude AI in an attack on a water and drainage utility in Mexico.

    The post Claude AI Guided Hackers Toward OT Assets During Water Utility Intrusion appeared first on SecurityWeek.

  5. The company raised another $35 million as an extension to its previously announced Series C funding round.

    The post Autonomous Offensive Security Firm XBOW Raises $35 Million appeared first on SecurityWeek.

  6. The startup will invest in expanding its training categories, optimizing video generation, and growing its partnership ecosystem.

    The post Herd Security Raises $3 Million for AI-Powered Training Platform appeared first on SecurityWeek.

  7. Likely perpetrated by MuddyWater, the attack combined social engineering, persistence, credential harvesting, and data theft.

    The post Iranian APT Intrusion Masquerades as Chaos Ransomware Attack appeared first on SecurityWeek.

  8. Gavril Sandu, 53, was indicted in 2017, but was arrested and extradited to the United States only in 2026.

    The post Romanian Man Extradited to US for Role in Hacking Scheme 17 Years Ago appeared first on SecurityWeek.

  9. Agency issued guidance and calls on operators to build resilient OT environments capable of surviving extended isolation and cyber compromise.

    The post CISA Launches ‘CI Fortify’ to Prepare Critical Infrastructure for Geopolitical Cyber Conflict appeared first on SecurityWeek.

  10. The persistent, evasive implant provides remote access, surveillance, and credential exfiltration capabilities.

    The post Sophisticated Quasar Linux RAT Targets Software Developers appeared first on SecurityWeek.