Hot stuff

MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)

MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364) 2025-02-28 at 17:03 By Zeljka Zorz Users of the MITRE Caldera cyber security platform have been urged to plug a critical hole (CVE-2025–27364) that may allow unauthenticated attackers to achieve remote code execution. About MITRE Caldera MITRE Caldera is a platform built on the […]

React to this headline:

Loading spinner

MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364) Read More »

OSPS Baseline: Practical security best practices for open source software projects

OSPS Baseline: Practical security best practices for open source software projects 2025-02-28 at 14:49 By Help Net Security The Open Source Security Foundation (OpenSSF), a cross-industry initiative by the Linux Foundation, has announced the initial release of the Open Source Project Security Baseline (OSPS Baseline), a tiered framework of security practices that evolve with the

React to this headline:

Loading spinner

OSPS Baseline: Practical security best practices for open source software projects Read More »

Understanding the AI Act and its compliance challenges

Understanding the AI Act and its compliance challenges 2025-02-28 at 08:03 By Mirko Zorz In this Help Net Security interview, David Dumont, Partner at Hunton Andrews Kurth, discusses the implications of the EU AI Act and how organizations can leverage existing GDPR frameworks while addressing new obligations such as conformity assessments and transparency requirements. Dumont

React to this headline:

Loading spinner

Understanding the AI Act and its compliance challenges Read More »

The art of balancing data security with business goals

The art of balancing data security with business goals 2025-02-28 at 07:32 By Help Net Security In this Help Net Security video, Nathan Parks, Senior Research Specialist at Gartner, discusses their recent research, revealing that only 14% of security leaders effectively balance data security with business goals. 35% of leaders are focused on securing data,

React to this headline:

Loading spinner

The art of balancing data security with business goals Read More »

2024 phishing trends tell us what to expect in 2025

2024 phishing trends tell us what to expect in 2025 2025-02-27 at 14:18 By Zeljka Zorz Phishing has been the method most often employed by cybercriminals to achieve initial access to targeted organizations in 2024, according to risk advisory firm Kroll, which expects this trend to continue in 2025. But attackers have also increasingly been

React to this headline:

Loading spinner

2024 phishing trends tell us what to expect in 2025 Read More »

Siemens Teamcenter vulnerability could allow account takeover (CVE-2025-23363)

Siemens Teamcenter vulnerability could allow account takeover (CVE-2025-23363) 2025-02-27 at 11:32 By Zeljka Zorz A high-severity vulnerability (CVE-2025-23363) in the Siemens Teamcenter product lifecycle management (PLM) software could allow an attacker to steal users’ valid session data and gain unauthorized access to the vulnerable application. About CVE-2025-23363 Siemens Teamcenter is a suite of applications that

React to this headline:

Loading spinner

Siemens Teamcenter vulnerability could allow account takeover (CVE-2025-23363) Read More »

Debunking 5 myths about network automation

Debunking 5 myths about network automation 2025-02-27 at 06:02 By Help Net Security Imagine you’re a network engineer at an enterprise. You already have your hands full with IT priorities, including managing bandwidth related to working from home, the company’s new data center, and, more recently, computing needs to support AI adoption. Additionally, the security

React to this headline:

Loading spinner

Debunking 5 myths about network automation Read More »

Is your email or password among the 240+ million compromised by infostealers?

Is your email or password among the 240+ million compromised by infostealers? 2025-02-26 at 18:00 By Zeljka Zorz For the second time since the start of 2025, a huge number of login credentials extracted from infostealer logs has been added to the database powering the HaveIBeenPwned (HIBP) site and breach notification service. In January 2025,

React to this headline:

Loading spinner

Is your email or password among the 240+ million compromised by infostealers? Read More »

Hundreds of GitHub repos served up malware for years

Hundreds of GitHub repos served up malware for years 2025-02-26 at 13:13 By Zeljka Zorz Kaspersky researchers have unearthed an extensive and long-running malware delivery campaign that exploited users’ propensity for downloading code from GitHub and using it without first verifying whether it’s malicious. “Over the course of the GitVenom campaign, the threat actors behind

React to this headline:

Loading spinner

Hundreds of GitHub repos served up malware for years Read More »

The compliance illusion: Why your company might be at risk despite passing audits

The compliance illusion: Why your company might be at risk despite passing audits 2025-02-26 at 08:20 By Mirko Zorz For many CISOs, compliance can feel like a necessary evil and a false sense of security. While frameworks like ISO 27001, SOC 2, and PCI DSS offer structured guidelines, they don’t automatically equate to strong cybersecurity.

React to this headline:

Loading spinner

The compliance illusion: Why your company might be at risk despite passing audits Read More »

How enterprise leaders can secure and govern agentic AI

How enterprise leaders can secure and govern agentic AI 2025-02-26 at 08:20 By Help Net Security In this Help Net Security video, Nataraj Nagaratnam, an IBM Fellow and CTO for Cloud Security, discusses enterprises’ steps to lay a secure foundation for agentic AI deployments. Recent research from IBM and Morning Consult shows that 99% of

React to this headline:

Loading spinner

How enterprise leaders can secure and govern agentic AI Read More »

Background check, drug testing provider DISA suffers data breach

Background check, drug testing provider DISA suffers data breach 2025-02-25 at 20:06 By Zeljka Zorz DISA Global Solutions, a Texas-based company that provides employment screening services (including drug and alcohol testing and background checks) for over 55,000 organizations, has suffered a cyber incident that led to a data breach, which resulted in the potential compromise

React to this headline:

Loading spinner

Background check, drug testing provider DISA suffers data breach Read More »

China-based Silver Fox spoofs healthcare app to deliver malware

China-based Silver Fox spoofs healthcare app to deliver malware 2025-02-25 at 18:33 By Zeljka Zorz Silver Fox, a China-based threat actor that may or may not be backed by the Chinese government, has been delivering the ValleyRAT backdoor to unsuspecting users by disguising the malware as legitimate healthcare app (the Philips DICOM viewer), a Windows

React to this headline:

Loading spinner

China-based Silver Fox spoofs healthcare app to deliver malware Read More »

Cybersecurity needs a leader, so let’s stop debating and start deciding

Cybersecurity needs a leader, so let’s stop debating and start deciding 2025-02-25 at 18:09 By Help Net Security Have you ever heard anyone earnestly ask in a business, “Who owns legal?” or “Who sets the financial strategy?” Probably not – it should be obvious, right? Yet, when it comes to cybersecurity, the question of ownership

React to this headline:

Loading spinner

Cybersecurity needs a leader, so let’s stop debating and start deciding Read More »

Avoiding vendor lock-in when using managed cloud security services

Avoiding vendor lock-in when using managed cloud security services 2025-02-25 at 08:05 By Mirko Zorz In this Help Net Security interview, Marina Segal, CEO at Tamnoon, discusses the most significant obstacles when implementing managed cloud security in hybrid and multi-cloud environments. She shares insights on long onboarding times, legacy security gaps, vendor lock-in, and overlooked

React to this headline:

Loading spinner

Avoiding vendor lock-in when using managed cloud security services Read More »

PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)

PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159) 2025-02-24 at 16:18 By Zeljka Zorz A proof-of-concept (PoC) exploit for four critical Ivanti Endpoint Manager vulnerabilities has been released by Horizon3.ai researchers. The vulnerabilities – CVE-2024-10811, CVE-2024-13161, CVE-2024-13160 and CVE-2024-13159 – may be exploited by remote, unauthenticated attackers to leverage Ivanti EPM machine account credentials

React to this headline:

Loading spinner

PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159) Read More »

Man vs. machine: Striking the perfect balance in threat intelligence

Man vs. machine: Striking the perfect balance in threat intelligence 2025-02-24 at 08:00 By Mirko Zorz In this Help Net Security interview, Aaron Roberts, Director at Perspective Intelligence, discusses how automation is reshaping threat intelligence. He explains that while AI tools can process massive data sets, the nuanced judgment of experienced analysts remains critical. Roberts

React to this headline:

Loading spinner

Man vs. machine: Striking the perfect balance in threat intelligence Read More »

Why AI deployment requires a new level of governance

Why AI deployment requires a new level of governance 2025-02-24 at 07:09 By Help Net Security In this Help Net Security video, Lee Waskevich, VP of Security at ePlus, discusses how AI deployment demands enhanced governance and stricter controls, particularly in managing data. The recent ePlus AI Readiness survey revealed that the top data concerns

React to this headline:

Loading spinner

Why AI deployment requires a new level of governance Read More »

Mastering the cybersecurity tightrope of protection, detection, and response

Mastering the cybersecurity tightrope of protection, detection, and response 2025-02-21 at 08:05 By Mirko Zorz In this Help Net Security interview, Chester Wisniewski, Director and Global Field CISO at Sophos, discusses the shifting ransomware landscape, the risks posed by quantum decryption threats, and the role of vendor security validation. Wisniewski notes that cyber resilience is

React to this headline:

Loading spinner

Mastering the cybersecurity tightrope of protection, detection, and response Read More »

Scroll to Top