Hot stuff

SolarWinds fixes critical Web Help Desk RCE vulnerability (CVE-2025-26399)

SolarWinds fixes critical Web Help Desk RCE vulnerability (CVE-2025-26399) 2025-09-24 at 19:44 By Zeljka Zorz SolarWinds has fixed yet another unauthenticated remote code execution vulnerability (CVE-2025-26399) in Web Help Desk (WHD), its popular web-based IT ticketing and asset management solution. While the vulnerability is currently not being leveraged by attackers, they might soon reverse-engineer the […]

React to this headline:

Loading spinner

SolarWinds fixes critical Web Help Desk RCE vulnerability (CVE-2025-26399) Read More »

Libraesva ESG zero-day vulnerability exploited by attackers (CVE-2025-59689)

Libraesva ESG zero-day vulnerability exploited by attackers (CVE-2025-59689) 2025-09-24 at 15:17 By Zeljka Zorz Suspected state-sponsored attackers have exploited a zero-day vulnerability (CVE-2025-59689) in the Libraesva Email Security Gateway (ESG), the Italian email security company has confirmed. About CVE-2025-59689 CVE-2025-59689 is a command injection vulnerability caused by improper sanitization when removing active code from files

React to this headline:

Loading spinner

Libraesva ESG zero-day vulnerability exploited by attackers (CVE-2025-59689) Read More »

Kali Linux 2025.3 brings improved virtual machine tooling, 10 new tools

Kali Linux 2025.3 brings improved virtual machine tooling, 10 new tools 2025-09-24 at 12:19 By Zeljka Zorz OffSec has released Kali Linux 2025.3, the most up-to-date version of its popular penetration testing and digital forensics platform. What’s new in Kali Linux 2025.3 Better virtual machine tooling The way Kali builds and ships its VM images

React to this headline:

Loading spinner

Kali Linux 2025.3 brings improved virtual machine tooling, 10 new tools Read More »

Building a stronger SOC through AI augmentation

Building a stronger SOC through AI augmentation 2025-09-24 at 09:22 By Mirko Zorz In this Help Net Security interview, Tim Bramble, Director of Threat Detection and Response at OpenText, discusses how SOC teams are gaining value from AI in detecting and prioritizing threats. By learning what “normal” looks like across users and systems, AI helps

React to this headline:

Loading spinner

Building a stronger SOC through AI augmentation Read More »

SonicWall adds rootkit removal capabilities to the SMA 100 series

SonicWall adds rootkit removal capabilities to the SMA 100 series 2025-09-23 at 16:24 By Zeljka Zorz SonicWall has released new firmware for its Secure Mobile Access (SMA) 100 series appliances, adding file-checking capabilities that help users remove known rootkit malware. The malware in question is the OVERSTEP user-mode rootkit, deployed by threat group UNC6148. The

React to this headline:

Loading spinner

SonicWall adds rootkit removal capabilities to the SMA 100 series Read More »

Malicious GitHub pages lure MacOS users into installing Atomic infostealer

Malicious GitHub pages lure MacOS users into installing Atomic infostealer 2025-09-22 at 17:52 By Zeljka Zorz MacOS users looking to download popular software such as LastPass, 1Password, After Effects, Gemini, and many others are in danger of getting saddled with the Atomic infostealer instead, LastPass has warned. The malware delivery campaign is ongoing and widespread

React to this headline:

Loading spinner

Malicious GitHub pages lure MacOS users into installing Atomic infostealer Read More »

How Juventus protects fans, revenue, and reputation during matchdays

How Juventus protects fans, revenue, and reputation during matchdays 2025-09-22 at 10:29 By Mirko Zorz In this Help Net Security interview, Mirko Rinaldini, Head of ICT at Juventus Football Club, discusses the club’s approach to cyber risk strategy. Juventus has developed a threat-led, outcomes-driven program that balances innovation with protections across matchdays, e-commerce, and digital

React to this headline:

Loading spinner

How Juventus protects fans, revenue, and reputation during matchdays Read More »

LLMs can boost cybersecurity decisions, but not for everyone

LLMs can boost cybersecurity decisions, but not for everyone 2025-09-19 at 09:11 By Mirko Zorz LLMs are moving fast from experimentation to daily use in cybersecurity. Teams are starting to use them to sort through threat intelligence, guide incident response, and help analysts handle repetitive work. But adding AI into the decision-making process brings new

React to this headline:

Loading spinner

LLMs can boost cybersecurity decisions, but not for everyone Read More »

SonicWall says attackers compromised some firewall configuration backup files

SonicWall says attackers compromised some firewall configuration backup files 2025-09-18 at 18:49 By Zeljka Zorz Between attackers exploiting 0-day and n-day vulnerabilities in the company’s firewalls and Secure Mobile Access appliances, SonicWall and its customers have had a tough year. And, unfortunately for them, the troubles are not over: unknown attackers have managed to brute-force

React to this headline:

Loading spinner

SonicWall says attackers compromised some firewall configuration backup files Read More »

Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)

Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585) 2025-09-18 at 16:00 By Zeljka Zorz Google has released a security update for the Chrome stable channel to fix a zero‑day vulnerability (CVE-2025-10585) reported by its Threat Analysis Group (TAG) on Tuesday. “Google is aware that an exploit for CVE-2025-10585 exists in the wild,” the company announced.

React to this headline:

Loading spinner

Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585) Read More »

Behind the scenes of cURL with its founder: Releases, updates, and security

Behind the scenes of cURL with its founder: Releases, updates, and security 2025-09-18 at 09:01 By Mirko Zorz In this Help Net Security interview, Daniel Stenberg, lead developer od cURL, discusses how the widely used tool remains secure across billions of devices, from cloud services to IoT. He shares insights into cURL’s decades-long journey of

React to this headline:

Loading spinner

Behind the scenes of cURL with its founder: Releases, updates, and security Read More »

Product showcase: Exaforce – The full lifecycle AI SOC platform

Product showcase: Exaforce – The full lifecycle AI SOC platform 2025-09-18 at 09:01 By Help Net Security Today’s SOCs face an impossible equation: too much noise, too many gaps, and too few hands. Detection coverage gaps leave companies exposed, false positives overwhelm analysts, manual investigations eat up valuable hours from the most expensive assets (experienced

React to this headline:

Loading spinner

Product showcase: Exaforce – The full lifecycle AI SOC platform Read More »

Microsoft disrupts the RaccoonO365 Phishing-as-a-Service operation, names alleged leader

Microsoft disrupts the RaccoonO365 Phishing-as-a-Service operation, names alleged leader 2025-09-17 at 15:23 By Zeljka Zorz Microsoft and Cloudflare have disrupted a Phishing-as-a-Service operation selling the RaccoonO365 kit for stealing Microsoft 365 account credentials. “Using a court order granted by the Southern District of New York, [we] seized 338 websites associated with the popular service, disrupting

React to this headline:

Loading spinner

Microsoft disrupts the RaccoonO365 Phishing-as-a-Service operation, names alleged leader Read More »

How a fake ICS network can reveal real cyberattacks

How a fake ICS network can reveal real cyberattacks 2025-09-17 at 09:03 By Mirko Zorz Researchers have introduced a new way to study and defend against ICS threats. Their project, called ICSLure, is a honeynet built to closely mimic a real industrial environment. Why traditional honeypots fall short Honeypots are systems designed to attract attackers

React to this headline:

Loading spinner

How a fake ICS network can reveal real cyberattacks Read More »

Creating a compliance strategy that works across borders

Creating a compliance strategy that works across borders 2025-09-17 at 08:37 By Mirko Zorz In this Help Net Security interview, Marco Goldberg, Managing Director at EQS Group, discusses how compliance and regulation are evolving worldwide. He talks about how organizations can stay compliant with international rules while keeping their systems practical and user-friendly. Goldberg points

React to this headline:

Loading spinner

Creating a compliance strategy that works across borders Read More »

Self-replicating worm hits 180+ npm packages in (largely) automated supply chain attack

Self-replicating worm hits 180+ npm packages in (largely) automated supply chain attack 2025-09-17 at 01:18 By Zeljka Zorz A potentially monumental supply chain attack is underway, thanks to a self-replicating worm-like payload that has been compromising packages published on the npm Registry. The worm has been dubbed “Shai-hulud” as it steals credentials from victims who

React to this headline:

Loading spinner

Self-replicating worm hits 180+ npm packages in (largely) automated supply chain attack Read More »

Ransomware attackers used incorrectly stored recovery codes to disable EDR agents

Ransomware attackers used incorrectly stored recovery codes to disable EDR agents 2025-09-16 at 15:46 By Zeljka Zorz All target organizations are different, but ransomware attackers are highly adaptive and appreciate – and will exploit – any mistake you make. The latest Akira ransomware attacks Managed security service providers and external incident responders have had a

React to this headline:

Loading spinner

Ransomware attackers used incorrectly stored recovery codes to disable EDR agents Read More »

Building security that protects customers, not just auditors

Building security that protects customers, not just auditors 2025-09-16 at 09:31 By Mirko Zorz In this Help Net Security interview, Nir Rothenberg, CISO at Rapyd, discusses global differences in payment security maturity and the lessons that can be learned from leading regions. He points out that good engineering usually leads to strong security, and cautions

React to this headline:

Loading spinner

Building security that protects customers, not just auditors Read More »

Phishing campaign targets Rust developers

Phishing campaign targets Rust developers 2025-09-15 at 19:27 By Zeljka Zorz Developers publishing crates (binaries and libraries written in Rust) on crates.io, Rust’s main public package registry, have been targeted with emails echoing the recent npm phishing campaign. The phishing email The emails started hitting developers’ inboxes on Friday, minutes after they published a (new)

React to this headline:

Loading spinner

Phishing campaign targets Rust developers Read More »

Scroll to Top