All you need to know about API security

APIs are certainly not new, but now they’re all around us. Every time you use a…

New Golang-based Skuld Malware Stealing Discord and Browser Data from Windows PCs

A new Golang-based information stealer called Skuld has compromised Windows systems across Europe, Southeast Asia, and the U.S.…

Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability

Security updates announced this week by Google for the Android operating system resolve over 50 vulnerabilities,…

Experts Unveil Exploit for Recent Windows Vulnerability Under Active Exploitation

Details have emerged about a now-patched actively exploited security flaw in Microsoft Windows that could be…

Clop Ransomware Gang Likely Aware of MOVEit Transfer Vulnerability Since 2021

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have published…

CISOs Plan to Increase Cybersecurity Spending Despite Economic Concerns, Study Says

 Nuspire, a leading managed security services provider (MSSP), announced findings from its second annual research study, revealing current…

Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech

Josh Lospinoso’s first cybersecurity startup was acquired in 2017 by Raytheon/Forcepoint.. His second, Shift5, works with the…

In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack 

SecurityWeek is publishing a weekly cybersecurity roundup that provides a concise compilation of noteworthy stories that…

New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force

Researchers have discovered an inexpensive attack technique that could be leveraged to brute-force fingerprints on smartphones…

3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them

If you’re a cybersecurity professional, you’re likely familiar with the sea of acronyms our industry is…