CyberSecure Specialist

$4.5 Million Offered in New Cloud Hacking Competition

Cloud security giant Wiz has announced a new hacking competition where participants can earn significant rewards for demonstrating exploits against widely used cloud software. The competition is named Zeroday.Cloud and it offers participants a total of $4.5 million in bug bounties. Interested security researchers must submit their entry by December 1 and they will demonstrate their exploits live on stage at the Black Hat Europe conference taking place December 10-11 in London.  Wiz has teamed…

Read More

In Other News: PQC Adoption, New Android Spyware, FEMA Data Breach

SecurityWeek’s cybersecurity news roundup provides a concise compilation of noteworthy stories that might have slipped under the radar. We provide a valuable summary of stories that may not warrant an entire article, but are nonetheless important for a comprehensive understanding of the cybersecurity landscape. Each week, we curate and present a collection of noteworthy developments, ranging from the latest vulnerability discoveries and emerging attack techniques to significant policy changes and industry reports.  Here are this…

Read More

Oneleet Raises $33 Million for Security Compliance Platform

Cybersecurity startup Oneleet has announced raising $33 million in a Series A funding round that brings the total raised by the company to $35 million. The investment round was led by Dawn Capital, with additional support from Y Combinator and several angel investors. Founded in 2022 and based in Amsterdam, Netherlands, Oneleet has built a platform that provides organizations with visibility into their security posture to help them improve protections and ensure compliance. The solution…

Read More

Red Hat Confirms GitLab Instance Hack, Data Theft

Red Hat on Thursday confirmed that one of its GitLab instances was hacked after a threat actor claimed to have stolen sensitive data belonging to the company and its customers.  It was initially reported that the hackers had targeted a GitHub instance, but the enterprise software giant clarified that it was actually a GitLab instance, specifically one used by the Red Hat Consulting team.  The hackers, calling themselves Crimson Collective, claimed to have stolen 570…

Read More

OpenSSL Vulnerabilities Allow Private Key Recovery, Code Execution, DoS Attacks

The OpenSSL Project has announced the availability of several new versions of the open source SSL/TLS toolkit, which include patches for three vulnerabilities. Versions 3.5.4, 3.4.3, 3.3.5, 3.2.6, 3.0.18, 1.0.2zm and 1.1.1zd of the OpenSSL Library have been released. Most of them fix all three vulnerabilities, tracked as CVE-2025-9230, CVE-2025-9231 and CVE-2025-9232. Two of the vulnerabilities have been assigned a ‘moderate severity’ rating. One of them is CVE-2025-9231, which may allow an attacker to recover…

Read More

Call for Presentations Open for 2025 CISO Forum Virtual Summit

The official Call for Presentations (CFP) for SecurityWeek’s 2025 CISO Forum Virtual Summit, being held November 12-13, 2025, is open through October 10, 2025. Throughout this two-day virtual event, sessions will have a strong focus on participation from CISOs in panel discussions and individual end-user experience presentations, along with talks from industry experts, analysts and other end-users, and thought leadership, strategy and technical sessions. This online event is expected to attract more than 2,500 attendee registrations from around the world. Through…

Read More

Sharpening the Focus on Product Requirements and Cybersecurity Risks: Updating Foundational Activities for IoT Product Manufacturers

Over the past few months, NIST has been revising and updating Foundational Activities for IoT Product Manufacturers (NIST IR 8259 Revision 1 Initial Public Draft), which describes recommended pre-market and post-market activities for manufacturers to develop products that meet their customers’ cybersecurity needs and expectations. Thank you so much for the thoughtful comments and feedback throughout this process; 400+ participants across industry, consumer organizations, academia, federal agencies, and researchers shared feedback in both the December…

Read More

The Cybersecurity Information Sharing Act Faces Expiration

The Cybersecurity Information Sharing Act (CISA) is designed to provide encouragement and protection for and while sharing threat information. A sunset clause built into the Cybersecurity Information Sharing Act 2015 (PDF) means it will expire at the end of September 2025 unless reauthorized by the US Congress. At the time of writing, it has not been reauthorized. “If you find something in your software that shouldn’t be there, and there’s some indication that it is…

Read More

CISA Strengthens Commitment to SLTT Governments

The Cybersecurity and Infrastructure Security Agency (CISA) announced that it has transitioned to a new model to better equip state, local, tribal, and territorial (SLTT) governments to strengthen shared responsibility nationwide. CISA is supporting our SLTT partners with access to grant funding, no-cost tools, and cybersecurity expertise to be resilient and lead at the local level.  CISA’s cooperative agreement with the Center for Internet Security (CIS) will reach its planned end on September 30, 2025.…

Read More

CISA and UK NCSC Release Joint Guidance for Securing OT Systems

CISA, in collaboration with the Federal Bureau of Investigation, the United Kingdom’s National Cyber Security Centre, and other international partners has released new joint cybersecurity guidance: Creating and Maintaining a Definitive View of Your Operational Technology (OT) Architecture. Building on the recent Foundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operators, this guidance explains how organizations can leverage data sources, such as asset inventories and manufacturer-provided resources like software bill of materials to establish…

Read More