Don’t miss

CISA warns about actively exploited Broadcom, Commvault vulnerabilities

CISA warns about actively exploited Broadcom, Commvault vulnerabilities 2025-04-29 at 15:47 By Zeljka Zorz The Cybersecurity and Infrastructure Security Agency (CISA) has added three new flaws to its Known Exploited Vulnerabilities catalog on Monday, affecting Commvault (CVE-2025-3928), Active! Mail (CVE-2025-42599), and Broadcom Brocade (CVE-2025-1976) solutions. CISA’s KEV catalog is constantly updated and provides IT admins […]

React to this headline:

Loading spinner

CISA warns about actively exploited Broadcom, Commvault vulnerabilities Read More »

Marks & Spencer cyber incident linked to ransomware group

Marks & Spencer cyber incident linked to ransomware group 2025-04-29 at 14:18 By Zeljka Zorz The “cyber incident” that British multinational retailer Marks & Spencer has been struggling with for over a week is a ransomware attack, multiple sources have asserted. The Telegraph’s sources say ransomware was deployed by a unnamed criminal gang. Bleeping Computer’s

React to this headline:

Loading spinner

Marks & Spencer cyber incident linked to ransomware group Read More »

Eyes, ears, and now arms: IoT is alive

Eyes, ears, and now arms: IoT is alive 2025-04-29 at 09:36 By Help Net Security I’ve never quite seen anything like this in my two decades of working in the Internet of Things (IoT) space. In just a few years, devices at home and work started including cameras to see and microphones to hear. Now,

React to this headline:

Loading spinner

Eyes, ears, and now arms: IoT is alive Read More »

What’s worth automating in cyber hygiene, and what’s not

What’s worth automating in cyber hygiene, and what’s not 2025-04-29 at 09:05 By Mirko Zorz Cyber hygiene sounds simple. Patch your systems, remove old accounts, update your software. But for large organizations, this gets messy fast. Systems number in the thousands. Teams are scattered. Some machines haven’t been rebooted in months. Automation can help. But

React to this headline:

Loading spinner

What’s worth automating in cyber hygiene, and what’s not Read More »

Want faster products and stronger trust? Build security in, not bolt it on

Want faster products and stronger trust? Build security in, not bolt it on 2025-04-29 at 08:42 By Mirko Zorz In this Help Net Security interview, Christopher Kennedy, CISO at Group 1001, discusses how cybersecurity initiatives are reshaping enterprise cybersecurity strategy. He explains why security must be embedded across IT, business lines, and product development, how

React to this headline:

Loading spinner

Want faster products and stronger trust? Build security in, not bolt it on Read More »

DDoS attacks jump 358% compared to last year

DDoS attacks jump 358% compared to last year 2025-04-29 at 08:04 By Mirko Zorz Cloudflare says it mitigated 20.5 million DDoS attacks in the first quarter of 2025. This is a 358% increase compared to the same time last year. Their Q1 2025 DDoS report highlights a rise in the number and size of attacks,

React to this headline:

Loading spinner

DDoS attacks jump 358% compared to last year Read More »

Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)

Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324) 2025-04-28 at 13:00 By Zeljka Zorz CVE-2025-31324, a critical vulnerability in the SAP NetWeaver platform, is being actively exploited by attackers to upload malicious webshells to enable unauthorized file uploads and code execution. The vulnerability was initially leveraged in zero-day attacks spotted by ReliaQuest

React to this headline:

Loading spinner

Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324) Read More »

Threat actors are scanning your environment, even if you’re not

Threat actors are scanning your environment, even if you’re not 2025-04-28 at 08:32 By Zeljka Zorz In a world where organizations’ digital footprint is constantly changing and attackers regularly capitalize on security failings in exposed IT assets, making the effort to minimize your external attack surface is a no-brainer. The goal is simple: Make your

React to this headline:

Loading spinner

Threat actors are scanning your environment, even if you’re not Read More »

GoSearch: Open-source OSINT tool for uncovering digital footprints

GoSearch: Open-source OSINT tool for uncovering digital footprints 2025-04-28 at 08:01 By Help Net Security GoSearch is an open-source OSINT tool built to uncover digital footprints linked to specific usernames. Designed for speed and accuracy, it lets users quickly track someone’s online presence across multiple platforms. GoSearch incorporates data from Hudson Rock’s Cybercrime Database, offering

React to this headline:

Loading spinner

GoSearch: Open-source OSINT tool for uncovering digital footprints Read More »

Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)

Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610) 2025-04-25 at 12:39 By Zeljka Zorz Researchers have uncovered three serious vulnerabilities in Rack, a server interface used by most Ruby web app frameworks (Ruby on Rails, Sinatra, Hanami, Roda, and others). Two of the flaws – CVE-2025-25184 and CVE-2025-27111 – could allow attackers to manipulate

React to this headline:

Loading spinner

Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610) Read More »

Top must-visit companies at RSAC 2025

Top must-visit companies at RSAC 2025 2025-04-25 at 07:34 By Help Net Security RSAC 2025 Conference is taking place at the Moscone Center in San Francisco from April 28 – May 1. With hundreds of booths, countless product demos, and nonstop buzz, navigating RSAC can be overwhelming. That’s why we’ve done the legwork to highlight

React to this headline:

Loading spinner

Top must-visit companies at RSAC 2025 Read More »

Critical Commvault RCE vulnerability fixed, PoC available (CVE-2025-34028)

Critical Commvault RCE vulnerability fixed, PoC available (CVE-2025-34028) 2025-04-24 at 15:35 By Zeljka Zorz If your organization is using Commvault Command Center for your data protection, backup creation, configuration and restoration needs, you should check whether your on-premise installation has been upgraded to patch a critical vulnerability (CVE-2025-34028) that could allow unauthenticated remote code execution.

React to this headline:

Loading spinner

Critical Commvault RCE vulnerability fixed, PoC available (CVE-2025-34028) Read More »

Skyhawk Security brings preemptive cloud app defense to RSAC 2025

Skyhawk Security brings preemptive cloud app defense to RSAC 2025 2025-04-24 at 14:32 By Mirko Zorz Skyhawk Security is adding new protection for custom-built cloud applications. The company announced the update to its AI-powered Autonomous Purple Team for RSAC 2025 Conference, which starts April 28 in San Francisco. The AI-based purple team identifies security weaknesses

React to this headline:

Loading spinner

Skyhawk Security brings preemptive cloud app defense to RSAC 2025 Read More »

Understanding 2024 cyber attack trends

Understanding 2024 cyber attack trends 2025-04-24 at 13:04 By Zeljka Zorz Mandiant has released the M-Trends 2025 report, which outlines global cyber attack trends based on their own incident response engagements from 2024. Key trends and insights In 2024, Mandiant handled more incidents in the financial sector than in any other industry: 17.4%. Other popular

React to this headline:

Loading spinner

Understanding 2024 cyber attack trends Read More »

Coaching AI agents: Why your next security hire might be an algorithm

Coaching AI agents: Why your next security hire might be an algorithm 2025-04-24 at 08:31 By Help Net Security Security teams are drowning in alerts. The sheer volume of threats, suspicious activity, and false positives makes it nearly impossible for analysts to investigate everything effectively. Enter agentic AI, capable of completing hundreds of tasks simultaneously

React to this headline:

Loading spinner

Coaching AI agents: Why your next security hire might be an algorithm Read More »

Review: Artificial Intelligence for Cybersecurity

Review: Artificial Intelligence for Cybersecurity 2025-04-24 at 07:39 By Mirko Zorz Artificial Intelligence for Cybersecurity is a practical guide to how AI and machine learning are changing the way we defend digital systems. The book aims to explain how AI can help solve real cybersecurity problems. It does that well, but it’s not for everyone.

React to this headline:

Loading spinner

Review: Artificial Intelligence for Cybersecurity Read More »

Released: MITRE ATT&CK v17.0, now with ESXi attack TTPs

Released: MITRE ATT&CK v17.0, now with ESXi attack TTPs 2025-04-23 at 16:13 By Zeljka Zorz MITRE has released the latest version of its ATT&CK framework, which now also includes a new section (“matrix”) to cover the tactics, techniques and procedures (TTPs) used to target VMware ESXi hypervisors. About MITRE ATT&CK MITRE ATT&CK is a regularly

React to this headline:

Loading spinner

Released: MITRE ATT&CK v17.0, now with ESXi attack TTPs Read More »

When confusion becomes a weapon: How cybercriminals exploit economic turmoil

When confusion becomes a weapon: How cybercriminals exploit economic turmoil 2025-04-23 at 09:02 By Help Net Security It begins with a simple notification: “Markets in Free Fall.” Within moments, the headlines multiply: new tariffs, emergency actions, plummeting consumer confidence. Across boardrooms and break rooms, anxiety ripples at every level. People begin refreshing inboxes and apps

React to this headline:

Loading spinner

When confusion becomes a weapon: How cybercriminals exploit economic turmoil Read More »

SWE-agent: Open-source tool uses LLMs to fix issues in GitHub repositories

SWE-agent: Open-source tool uses LLMs to fix issues in GitHub repositories 2025-04-23 at 08:36 By Mirko Zorz By connecting powerful language models like GPT-4o and Claude Sonnet 3.5 to real-world tools, the open-source tool SWE-agent allows them to autonomously perform complex tasks: from fixing bugs in live GitHub repositories and solving cybersecurity challenges, to browsing

React to this headline:

Loading spinner

SWE-agent: Open-source tool uses LLMs to fix issues in GitHub repositories Read More »

Scroll to Top