HPE Investigating Breach Claims Involving Source Code: Report

Hewlett Packard Enterprise acknowledged it is investigating claims by a threat actor that reportedly involve theft…

Seekr Welcomes National Security Executive Dr. Lisa Costa to AI Advisory Board

Seekr®, the trusted AI company, today announced that National Security Executive Dr. Lisa Costa has joined its advisory…

DryRun Security Secures $8.7M, Launches Natural Language Code Policies to Save Time and Decrease Risk in Application Security

DryRun Security, the AI-native company delivering application security (AppSec) for development and security teams, today announced…

Call for Presentations Open for SecurityWeek’s 2025 Supply Chain Security & Third-Party Risk Summit

The increasing frequency and severity of software supply chain attacks have sent shockwaves through the cybersecurity…

Top Cybersecurity Threats, Tools and Tips

The cyber world’s been buzzing this week, and it’s all about staying ahead of the bad…

Ransomware on ESXi: The Mechanization of Virtualized Attacks

In 2024, ransomware attacks targeting VMware ESXi servers reached alarming levels, with the average ransom demand…

Expired Domains Allowed Control Over 4,000 Backdoors on Compromised Systems

No less than 4,000 unique web backdoors previously deployed by various threat actors have been hijacked…

WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables

Cybersecurity researchers are warning of a new stealthy credit card skimmer campaign that targets WordPress e-commerce checkout pages…

Microsoft Sues Hacking Group Exploiting Azure AI for Harmful Content Creation

Microsoft has revealed that it’s pursuing legal action against a “foreign-based threat–actor group” for operating a hacking-as-a-service infrastructure…

SAP Patches Critical Vulnerabilities in NetWeaver

Enterprise software maker SAP on Tuesday announced the release of 14 new security notes as part…