Cybersecurity M&A Roundup: 41 Deals Announced in June 2025
Forty-one cybersecurity merger and acquisition (M&A) deals were announced in June 2025. The post Cybersecurity M&A Roundup: 41 Deals Announced in June 2025 appeared first on SecurityWeek.
Forty-one cybersecurity merger and acquisition (M&A) deals were announced in June 2025. The post Cybersecurity M&A Roundup: 41 Deals Announced in June 2025 appeared first on SecurityWeek.
As Kelly Benefits’s investigation into a recent data breach progressed, the number of impacted individuals continued to grow. The post Kelly Benefits Data Breach Impacts 550,000 People appeared first on SecurityWeek.
A whole class of speculative execution attacks against CPUs were published in 2018. They seemed pretty catastrophic at the time. But the fixes were as well. Speculative execution was a way to speed up CPUs, and removing those enhancements resulted in significant performance drops. Now, people are rethinking the trade-off.Read More »Ubuntu Disables Spectre/Meltdown Protections
CISA warns that Iranian cyber actors may target critical infrastructure in the United States.
With nearly 80% of cyber threats now mimicking legitimate user behavior, how are top SOCs determining what’s legitimate traffic and what is potentially dangerous? Where do you turn when firewalls and endpoint detection and response (EDR) fall short at detecting the most important threats to your organization? Breaches at edgeRead More »That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat
Cybersecurity researchers are calling attention to phishing campaigns that impersonate popular brands and trick targets into calling phone numbers operated by threat actors. “A significant portion of email threats with PDF payloads persuade victims to call adversary-controlled phone numbers, displaying another popular social engineering technique known as Telephone-Oriented Attack DeliveryRead More »Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns
A vulnerability in the Forminator WordPress plugin allows attackers to delete arbitrary files and take over impacted websites. The post Forminator WordPress Plugin Vulnerability Exposes 400,000 Websites to Takeover appeared first on SecurityWeek.
The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has levied sanctions against Russia-based bulletproof hosting (BPH) service provider Aeza Group to assist threat actors in their malicious activities and targeting victims in the country and across the world. The sanctions also extend to its subsidiaries AezaRead More »U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware
CISA says two more vulnerabilities in the messaging application TeleMessage TM SGNL have been exploited in the wild. The post CISA Warns of Two Exploited TeleMessage Vulnerabilities appeared first on SecurityWeek.
The International Criminal Court (ICC) has detected and contained a sophisticated and targeted cyberattack. The post Cyberattack Targets International Criminal Court appeared first on SecurityWeek.