By Ionut Arghire
Vulnerable SolarWinds Web Help Desk instances were exploited in December 2025 for initial access.
The post Recent SolarWinds Flaws Potentially Exploited as Zero-Days appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »
By Eduard Kovacs
The European Commission’s ruling is based on extensive feedback from customers and rival cloud security and infrastructure vendors.
The post EU Unconditionally Approves Google’s $32B Acquisition of Wiz appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »
By Associated Press
Officials said data will now be classified as one of four categories: “public,” “sensitive,” “confidential” or “restricted.”
The post Nevada Unveils New Statewide Data Classification Policy Months After Cyberattack appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »
Funding for the Department of Homeland Security (DHS) will expire at 12 am on Saturday, February 14th.
Source:: Security magazin
Posted in Uncategorized | No Comments »
By Kevin Townsend
New research shows attackers increasingly abusing APIs at machine speed as AI-driven systems widen exposure and amplify impact.
The post API Threats Grow in Scale as AI Expands the Blast Radius appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »
By Eduard Kovacs
CISA updated 59 KEV entries in 2025 to specify that the vulnerabilities have been exploited in ransomware attacks.
The post Questions Raised Over CISA’s Silent Ransomware Updates in KEV Catalog appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »
By Eduard Kovacs
Significant cybersecurity M&A deals announced by CrowdStrike, Infoblox, JumpCloud, LevelBlue, OneSpan, and Radware.
The post Cybersecurity M&A Roundup: 34 Deals Announced in January 2026 appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »
By Eduard Kovacs
The company has fixed several critical vulnerabilities that can be exploited for arbitrary code execution.
The post Patch Tuesday: Adobe Fixes 44 Vulnerabilities in Creative Apps appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »
By Ionut Arghire
Impacting the ‘dyld’ system component, the memory corruption issue can be exploited for arbitrary code execution.
The post Apple Patches iOS Zero-Day Exploited in ‘Extremely Sophisticated Attack’ appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »
The six-phase playbook of how romance scams actually work.
Source:: Security magazin
Posted in Uncategorized | No Comments »