Hi, what are you looking for?


In files downloaded from the internet, HTML tags referencing external paths could be used to leak NTLM hashes during file previews.

The tech giant has rolled out fixes for 173 CVEs, including five critical-severity security defects.

Users can continue receiving important security updates for Windows 10 by enrolling in the ESU program.

The attack uses a passive interposer to control the SGX enclave and extract the DCAP attestation key, breaking the mechanism.
The vulnerability could lead to a denial-of-service condition or memory corruption when a malicious font is processed.
Binarly researchers have found a way to bypass a patch for a previously disclosed vulnerability.
Neon Cyber argues that phishing, social engineering, and insider threats demand protections that follow users into the browser, where most attacks now begin.
Researchers devise Phoenix, a new Rowhammer attack that achieves root on DDR5 systems in less than two minutes.
The bootstrapped company will invest in an AI-powered unified enterprise platform combining configuration, compliance, patching, and vulnerability management.
ReVault vulnerabilities in the ControlVault3 firmware in Dell laptops could lead to firmware modifications or Windows login bypass.
Vulnerabilities discovered by Binarly in Lenovo devices allow privilege escalation, code execution, and security bypass.
Vulnerabilities in Gigabyte firmware implementations could allow attackers to disable Secure Boot and execute code during the early boot phase.
After more than 40 years of being set against a very recognizable blue, the updated error message will soon be displayed across a black...
Microsoft is preparing a private preview of new Windows endpoint security platform capabilities to help antimalware vendors create solutions that run outside the kernel.
With end of support scheduled for October 2025, Windows 10 users will be able to continue receiving important security updates.
Three high-severity Tenable Agent vulnerabilities could allow users to overwrite and delete files, or execute arbitrary code, with System privileges.
Vulnerable DTResearch UEFI firmware applications can be used in BYOVD attacks to bypass Secure Boot.
The Israeli company said the Series B raise was led by ClearSky and included equity stakes for new backer Phoenix Financial.
Intel, AMD and Arm each published security advisories on Patch Tuesday, including for newly disclosed CPU attacks.
CrowdStrike said the planned cuts will affect approximately 500 employees and will span the first half of fiscal 2026.
Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
Dr. Torsten George, a renowned cybersecurity expert, will dissect the Scattered Spider playbook to highlight key lessons organizations can apply to stay ahead of these persistent and evolving threats.
RegisterDesigned for senior level cybersecurity leaders to discuss, share and learn innovative cybersecurity and risk management strategies.
RegisterF5 has appointed Michael Montoya as Chief Technology Operations Officer.
Former CISA Chief Bridget Bean has joined The Heritage Foundation as visiting fellow.
Allan Friedman, often described as the Father of SBOMs, has joined NetRise as a strategic advisor.
Former IBM CTO of Security Talha Tariq has joined web development platform Vercel as CTO of Security.
Mimecast has promoted Graham Douglas to the role of Chief Customer & Revenue Officer.
If you are recruiting for a Field CISO, Field CTO, etc., or are looking to leverage a resource at your company in one of these roles, what are some things you should be aware of?(Joshua Goldfarb)
Balancing innovation with ethical governance is crucial for ensuring fairness, accountability, and public trust in the age of intelligent machines.(Steve Durbin)
How security posture management for AI can protect against model poisoning, excessive agency, jailbreaking and other LLM risks.(Etay Maor)
This year’s theme focuses on government entities and small and medium-sized businesses that are vital to protecting the systems and services that keep our communities running.(Torsten George)
Bringing politics into professional spaces undermines decision-making, collaboration, and ultimately weakens security teams.(Joshua Goldfarb)
Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecuritynews, threats, and expert insights. Unsubscribe at any time.