American pizza chain California Pizza Kitchen (CPK) is notifying employees of a data breach that might have resulted in some of their personal information being accessed by hackers.
SnapAttack Spins Out of Booz Allen Hamilton With $8 Million in Funding
Threat hunting and detection company SnapAttack this week announced closing an $8 million funding round, just as it spun out of Booz Allen Hamilton.
GBG to Acquire Acuant in $736 Million Deal
UK-based identity verification and fraud prevention solutions provider GBG on Thursday announced that it has agreed to acquire Acuant in a $736 million deal.
SecurityWeek to Host Security Operations Summit as Virtual Event Dec. 8
North Korean Hacker Group Intensifies Espionage Campaigns
A North Korea-linked threat actor tracked as TA406 has intensified its attacks in 2021, particularly credential harvesting campaigns, Proofpoint reports.
US Indicts Iranians for Election Meddling
The US Justice Department announced indictments Thursday of two Iranians who allegedly took part in an online “disinformation and threat” campaign to influence American voters in the 2020 presidential election.
Supply Chain Security Fears Escalate as Iranian APTs Caught Hitting IT Services Sector
Fears of software supply chain attacks escalated again this week with a new warning from Microsoft that it has caught Iranian threat actors breaking into IT services shops in India and Israel and using that access to hit the real targets.
Acronyms Aside, the SOC of the Future Needs These 3 Capabilities
Every discipline has its acronyms, but I’d venture to say cybersecurity has more than its share. We use them to describe threat actors and how they operate, as well as different security teams, their certifications and the tools they use. There’s nothing wrong with acronyms, but when they are used to describe emerging solutions, an interesting phenomenon occurs…that new acronym becomes the next silver bullet technology that will solve all our security problems.
Cyber Defenders Should Prepare for Holiday Ransomware Attacks
High days and holidays are prime time for ransomware. This should come as no surprise to anyone – but many companies remain surprisingly unaware or at least unprepared.
New ETW Attacks Can Allow Hackers to ‘Blind’ Security Products
Researchers have described two new attack methods that can be used to “blind” cybersecurity products that rely on a logging mechanism named Event Tracing for Windows (ETW).



