Don’t miss

Falco: Open-source cloud-native runtime security tool for Linux

Falco: Open-source cloud-native runtime security tool for Linux 2025-07-16 at 07:46 By Help Net Security Falco is an open-source runtime security tool for Linux systems, built for cloud-native environments. It monitors the system in real time to spot unusual activity and possible security threats. Falco is a graduated project from the Cloud Native Computing Foundation […]

React to this headline:

Loading spinner

Falco: Open-source cloud-native runtime security tool for Linux Read More »

Most cybersecurity risk comes from just 10% of employees

Most cybersecurity risk comes from just 10% of employees 2025-07-16 at 07:46 By Anamarija Pogorelec A new report from Living Security and the Cyentia Institute sheds light on the real human element behind cybersecurity threats, and it’s not what most organizations expect. The Risky Business: Who Protects & Who Puts You at Risk report analyzes

React to this headline:

Loading spinner

Most cybersecurity risk comes from just 10% of employees Read More »

Vulnerable firmware for Gigabyte motherboards could allow bootkit installation

Vulnerable firmware for Gigabyte motherboards could allow bootkit installation 2025-07-15 at 16:19 By Zeljka Zorz UEFI firmware running on 100+ Gigabyte motherboard models is affected by memory corruption vulnerabilities that may allow attackers to install persistent and difficult-to-detect bootkits (i.e., malware designed to infect the computer’s boot process). “While AMI (the original firmware supplier) has

React to this headline:

Loading spinner

Vulnerable firmware for Gigabyte motherboards could allow bootkit installation Read More »

AsyncRAT evolves as ESET tracks its most popular malware forks

AsyncRAT evolves as ESET tracks its most popular malware forks 2025-07-15 at 12:50 By Sinisa Markovic AsyncRAT is an open-source remote access trojan that first appeared on GitHub in 2019. It includes a range of typical RAT capabilities, such as keylogging, screen capture, credential theft, and more. Its simplicity and open-source design have made it

React to this headline:

Loading spinner

AsyncRAT evolves as ESET tracks its most popular malware forks Read More »

Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech

Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech 2025-07-15 at 09:00 By Mirko Zorz For decades, manufacturers and security professionals have been playing a high-stakes game of cat and mouse with counterfeiters. From holograms and QR codes to RFID tags and serial numbers, the industry’s toolkit has evolved, but so have the

React to this headline:

Loading spinner

Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech Read More »

Securing vehicles as they become platforms for code and data

Securing vehicles as they become platforms for code and data 2025-07-15 at 08:31 By Mirko Zorz In this Help Net Security interview, Robert Knoblauch, CISO at Element Fleet Management, discusses how the rise of connected vehicles and digital operations is reshaping fleet management cybersecurity. He points to growing risks like API breaches, tampering with onboard

React to this headline:

Loading spinner

Securing vehicles as they become platforms for code and data Read More »

How service providers can turn cybersecurity into a scalable MRR engine

How service providers can turn cybersecurity into a scalable MRR engine 2025-07-15 at 08:04 By Help Net Security A growing number of MSPs, MSSPs, and consultancies are moving beyond one-and-done engagements and transforming from tactical vendors into strategic advisors. They’re shifting toward recurring cybersecurity programs that not only improve client outcomes but also generate compounding

React to this headline:

Loading spinner

How service providers can turn cybersecurity into a scalable MRR engine Read More »

Stop settling for check-the-box cybersecurity policies

Stop settling for check-the-box cybersecurity policies 2025-07-15 at 07:43 By Sinisa Markovic After every breach, people ask: How did this happen if there were cybersecurity policies in place? The truth is, just having them doesn’t stop attacks. They only work if people know them and follow them when it matters. That’s where things often break

React to this headline:

Loading spinner

Stop settling for check-the-box cybersecurity policies Read More »

Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)

Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257) 2025-07-14 at 16:34 By Zeljka Zorz With two proof-of-concept (PoC) exploits made public late last week, CVE-2025-25257 – a critical SQL command injection vulnerability in Fortinet’s FortiWeb web application firewall – is expected to be leveraged by attackers soon. About CVE-2025-25257 CVE-2025-25257 is found

React to this headline:

Loading spinner

Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257) Read More »

FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare

FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare 2025-07-14 at 09:32 By Mirko Zorz In this Help Net Security interview, Gail Hodges, Executive Director at the OpenID Foundation, discusses how the Foundation ensures global consistency in FAPI 2.0 implementations and helps different industries, including healthcare, adopt secure and interoperable identity

React to this headline:

Loading spinner

FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare Read More »

pqcscan: Open-source post-quantum cryptography scanner

pqcscan: Open-source post-quantum cryptography scanner 2025-07-14 at 09:04 By Mirko Zorz pqcscan is an open-source tool that lets users scan SSH and TLS servers to see which Post-Quantum Cryptography (PQC) algorithms they claim to support. It saves the results in JSON files. You can turn one or more of these files into an HTML report

React to this headline:

Loading spinner

pqcscan: Open-source post-quantum cryptography scanner Read More »

Bitdefender PHASR: Proactive hardening demo overview

Bitdefender PHASR: Proactive hardening demo overview 2025-07-14 at 08:35 By Help Net Security Discover how Bitdefender PHASR enables organizations to identify and remediate security misconfigurations before attackers can exploit them. This demo walks through PHASR’s proactive hardening capabilities, showing how it transforms visibility into actionable protection. The post Bitdefender PHASR: Proactive hardening demo overview appeared

React to this headline:

Loading spinner

Bitdefender PHASR: Proactive hardening demo overview Read More »

Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)

Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812) 2025-07-11 at 15:32 By Zeljka Zorz Threat actors are actively exploiting a recently fixed remote code execution vulnerability (CVE-2025-47812) in Wing FTP Server, security researchers have warned. Wing FTP Server and CVE-2025-47812 Wing FTP Server is a commercial file transfer server solution used by businesses,

React to this headline:

Loading spinner

Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812) Read More »

Where policy meets profit: Navigating the new frontier of defense tech startups

Where policy meets profit: Navigating the new frontier of defense tech startups 2025-07-11 at 08:33 By Mirko Zorz In this Help Net Security interview, Thijs Povel, Managing Partner at Ventures.eu, discusses how the firm evaluates emerging technologies through the lens of defense and resilience. He explains how founders from both defense and adjacent sectors are

React to this headline:

Loading spinner

Where policy meets profit: Navigating the new frontier of defense tech startups Read More »

Four arrested in connection with M&S, Co-op ransomware attacks

Four arrested in connection with M&S, Co-op ransomware attacks 2025-07-10 at 17:19 By Zeljka Zorz Four individuals suspected of having been involved in the ransomware attacks that hit UK-based retailers earlier this year have been arrested by the UK National Crime Agency. “Two males aged 19, another aged 17, and a 20-year-old female were apprehended

React to this headline:

Loading spinner

Four arrested in connection with M&S, Co-op ransomware attacks Read More »

Ruckus network management solutions riddled with unpatched vulnerabilities

Ruckus network management solutions riddled with unpatched vulnerabilities 2025-07-10 at 15:52 By Zeljka Zorz Claroty researcher Noam Moshe has discovered serious vulnerabilities in two Ruckus Networks (formerly Ruckus Wireless) products that may allow attackers to compromise the environments managed by the affected software, Carnegie Mellon University’s CERT Coordination Center (CERT/CC) has warned. The vulnerabilities have

React to this headline:

Loading spinner

Ruckus network management solutions riddled with unpatched vulnerabilities Read More »

What EU’s PQC roadmap means on the ground

What EU’s PQC roadmap means on the ground 2025-07-10 at 09:11 By Mirko Zorz In this Help Net Security interview, David Warburton, Director at F5 Labs, discusses how the EU’s Post-Quantum Cryptography (PQC) roadmap aligns with global efforts and addresses both the technical and regulatory challenges of migrating to PQC. Warburton also outlines practical steps

React to this headline:

Loading spinner

What EU’s PQC roadmap means on the ground Read More »

Open source has a malware problem, and it’s getting worse

Open source has a malware problem, and it’s getting worse 2025-07-10 at 08:27 By Help Net Security Sonatype has published its Q2 2025 Open Source Malware Index, identifying 16,279 malicious open source packages across major ecosystems such as npm and PyPI. This brings the total number of malware packages discovered by the company to 845,204.

React to this headline:

Loading spinner

Open source has a malware problem, and it’s getting worse Read More »

Train smarter, respond faster: Close the skill gaps in your SOC

Train smarter, respond faster: Close the skill gaps in your SOC 2025-07-09 at 16:05 By Zeljka Zorz “In today’s fast-paced digital landscape” – as AI chatbots are fond of phrasing it – a cyber attack targeting your organization is a statistical certainty. But is your security team ready to respond when it happens? Can they

React to this headline:

Loading spinner

Train smarter, respond faster: Close the skill gaps in your SOC Read More »

Microsoft fixes critical wormable Windows flaw (CVE-2025-47981)

Microsoft fixes critical wormable Windows flaw (CVE-2025-47981) 2025-07-09 at 14:31 By Zeljka Zorz For July 2025 Patch Tuesday, Microsoft has released patches for 130 vulnerabilities, among them one that’s publicly disclosed (CVE-2025-49719) and a wormable RCE bug on Windows and Windows Server (CVE-2025-47981). CVE-2025-49719 and CVE-2025-49717, in Microsoft SQL Server CVE-2025-49719 is an uninitialized memory

React to this headline:

Loading spinner

Microsoft fixes critical wormable Windows flaw (CVE-2025-47981) Read More »

Scroll to Top