News

Why should companies or organizations convert to FIDO security keys?

Why should companies or organizations convert to FIDO security keys? 2025-06-25 at 08:09 By Mirko Zorz In this Help Net Security interview, Alexander Summerer, Head of Authentication at Swissbit, explains how FIDO security keys work, what threats they address, and why they’re gaining traction across industries, from healthcare to critical infrastructure. He also shares insights […]

React to this headline:

Loading spinner

Why should companies or organizations convert to FIDO security keys? Read More »

Companies negotiate their way to lower ransom payments

Companies negotiate their way to lower ransom payments 2025-06-25 at 07:38 By Help Net Security Nearly 50% of companies paid the ransom to recover their data, the second-highest rate in six years, according to Sophos. How actual payments stack up with the initial demand Ransom payments and recovery costs are on the decline Despite the

React to this headline:

Loading spinner

Companies negotiate their way to lower ransom payments Read More »

Users lack control as major AI platforms share personal info with third parties

Users lack control as major AI platforms share personal info with third parties 2025-06-25 at 07:02 By Help Net Security Some of the most popular generative AI and large language model (LLM) platforms, from companies like Meta, Google, and Microsoft, are collecting sensitive data and sharing it with unknown third parties, leaving users with limited

React to this headline:

Loading spinner

Users lack control as major AI platforms share personal info with third parties Read More »

Trojanized SonicWall NetExtender app exfiltrates VPN credentials

Trojanized SonicWall NetExtender app exfiltrates VPN credentials 2025-06-24 at 15:00 By Zeljka Zorz Unknown attackers have trojanized SonicWall’s SSL-VPN NetExtender application, the company has warned on Monday, and have been tricking users into downloading it from a lookalike site(s?). The trojanized SonicWall NetExtender installer SonicWall NetExtender is an SSL‑VPN client used by companies to give remote

React to this headline:

Loading spinner

Trojanized SonicWall NetExtender app exfiltrates VPN credentials Read More »

High-risk WinRAR RCE vulnerability patched, update quickly! (CVE-2025-6218)

High-risk WinRAR RCE vulnerability patched, update quickly! (CVE-2025-6218) 2025-06-24 at 12:45 By Zeljka Zorz A recently patched directory traversal vulnerability (CVE-2025-6218) in WinRAR could be leveraged by remote attackers to execute arbitrary code on affected installations. The vulnerability has been patched in WinRAR 7.12 beta 1, released on June 10, 2025, and users are advised

React to this headline:

Loading spinner

High-risk WinRAR RCE vulnerability patched, update quickly! (CVE-2025-6218) Read More »

Common Good Cyber Fund launches to support nonprofits protecting the internet

Common Good Cyber Fund launches to support nonprofits protecting the internet 2025-06-24 at 11:49 By Sinisa Markovic The Common Good Cyber Fund is a new effort to support cybersecurity that protects everyone, especially those most at risk of harassment, harm, or coercion. It has the potential to make cybersecurity better and more accessible for billions

React to this headline:

Loading spinner

Common Good Cyber Fund launches to support nonprofits protecting the internet Read More »

Why work-life balance in cybersecurity must start with executive support

Why work-life balance in cybersecurity must start with executive support 2025-06-24 at 08:34 By Mirko Zorz In this Help Net Security interview, Stacy Wallace, CISO at Arizona Department of Revenue, talks about the realities of work-life balance in cybersecurity leadership. She shares how her team handles constant pressure, sets boundaries, and deals with stress. Wallace

React to this headline:

Loading spinner

Why work-life balance in cybersecurity must start with executive support Read More »

Reconmap: Open-source vulnerability assessment, pentesting management platform

Reconmap: Open-source vulnerability assessment, pentesting management platform 2025-06-24 at 08:03 By Help Net Security Reconmap is an open source tool for vulnerability assessments and penetration testing. It helps security teams plan, carry out, and report on security tests from start to finish. The platform simplifies tasks and makes it easier for teams to work together,

React to this headline:

Loading spinner

Reconmap: Open-source vulnerability assessment, pentesting management platform Read More »

The real story behind cloud repatriation in 2025

The real story behind cloud repatriation in 2025 2025-06-24 at 07:40 By Help Net Security In this Help Net Security video, Mark Wilson, Technology and Innovation Director at Node4, shares key insights from the company’s 2025 mid-market report. He explores the surprising trend of cloud repatriation, where 97% of mid-market organizations plan to move some

React to this headline:

Loading spinner

The real story behind cloud repatriation in 2025 Read More »

Cybersecurity jobs available right now: June 24, 2025

Cybersecurity jobs available right now: June 24, 2025 2025-06-24 at 07:02 By Anamarija Pogorelec Cyber Security Analyst Ascendion | Singapore | On-site – View job details As a Cyber Security Analyst, you will lead incident response efforts, including forensic analysis, malware mitigation, and DoS attack resolution. Design and implement advanced security architectures with a focus

React to this headline:

Loading spinner

Cybersecurity jobs available right now: June 24, 2025 Read More »

Microsoft will start removing legacy drivers from Windows Update

Microsoft will start removing legacy drivers from Windows Update 2025-06-23 at 17:47 By Zeljka Zorz Microsoft will start removing legacy drivers from Windows Update to improve driver quality for Windows users but, most importantly, to increase security, the company has announced. This is intended to be an ongoing process and Microsoft is planning to introduce

React to this headline:

Loading spinner

Microsoft will start removing legacy drivers from Windows Update Read More »

CoinMarketCap, Cointelegraph compromised to serve pop-ups to drain crypto wallets

CoinMarketCap, Cointelegraph compromised to serve pop-ups to drain crypto wallets 2025-06-23 at 16:38 By Zeljka Zorz The CoinMarketCap and CoinTelegraph websites have been compromised over the weekend to serve clever phishing pop-ups to visitors, asking them to verify/connect their crypto wallets. The CoinMarketCap compromise CoinMarketCap (aka CMC) is a website popular with crypto investors as

React to this headline:

Loading spinner

CoinMarketCap, Cointelegraph compromised to serve pop-ups to drain crypto wallets Read More »

Critical Citrix NetScaler bug fixed, upgrade ASAP! (CVE-2025-5777)

Critical Citrix NetScaler bug fixed, upgrade ASAP! (CVE-2025-5777) 2025-06-23 at 14:14 By Zeljka Zorz Citrix has fixed a critical vulnerability (CVE-2025-5777) in NetScaler ADC and NetScaler Gateway reminiscent of the infamous and widely exploited CitrixBleed flaw. The vulnerabilities have been privately disclosed and there is no indication that they are under active exploitation. Nevertheless, the

React to this headline:

Loading spinner

Critical Citrix NetScaler bug fixed, upgrade ASAP! (CVE-2025-5777) Read More »

Stealthy backdoor found hiding in SOHO devices running Linux

Stealthy backdoor found hiding in SOHO devices running Linux 2025-06-23 at 11:02 By Mirko Zorz SecurityScorecard’s STRIKE team has uncovered a network of compromised small office and home office (SOHO) devices they’re calling LapDogs. The threat is part of a broader shift in how China-Nexus threat actors are using Operational Relay Box (ORB) networks to

React to this headline:

Loading spinner

Stealthy backdoor found hiding in SOHO devices running Linux Read More »

How CISOs can justify security investments in financial terms

How CISOs can justify security investments in financial terms 2025-06-23 at 09:06 By Mirko Zorz In this Help Net Security interview, John Verry, Managing Director at CBIZ, discusses how insurers and financial risk professionals evaluate cybersecurity maturity through different lenses. He also shows how framing cyber risk in business terms can strengthen investment cases and

React to this headline:

Loading spinner

How CISOs can justify security investments in financial terms Read More »

Quantum risk is already changing cybersecurity

Quantum risk is already changing cybersecurity 2025-06-23 at 08:18 By Mirko Zorz A new report from the Cyber Threat Alliance warns that the era of quantum risk is already underway, and security teams need to stop treating it like a problem for tomorrow. The report, Approaching Quantum Dawn: Closing the Cybersecurity Readiness Gap Before It’s

React to this headline:

Loading spinner

Quantum risk is already changing cybersecurity Read More »

71% of new hires click on phishing emails within 3 months

71% of new hires click on phishing emails within 3 months 2025-06-23 at 07:35 By Anamarija Pogorelec New hires are more likely to fall for phishing attacks and social engineering than longer-term employees, especially in their first 90 days, according to Keepnet. Why new hires are easy targets for phishing attacks Based on data from

React to this headline:

Loading spinner

71% of new hires click on phishing emails within 3 months Read More »

Medical device cyberattacks push hospitals into crisis mode

Medical device cyberattacks push hospitals into crisis mode 2025-06-23 at 07:14 By Help Net Security 22% of healthcare organizations have experienced cyberattacks that directly impacted medical devices, according to RunSafe Security. Three-quarters of these incidents disrupted patient care, including 24% that required patient transfers to other facilities. The survey reveals that healthcare cybersecurity has evolved

React to this headline:

Loading spinner

Medical device cyberattacks push hospitals into crisis mode Read More »

Week in review: Keyloggers found on Outlook login pages, police shut down dark web drug market

Week in review: Keyloggers found on Outlook login pages, police shut down dark web drug market 2025-06-22 at 09:33 By Help Net Security Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Researchers unearth keyloggers on Outlook login pages Unknown threat actors have compromised internet-accessible Microsoft Exchange Servers of

React to this headline:

Loading spinner

Week in review: Keyloggers found on Outlook login pages, police shut down dark web drug market Read More »

Scroll to Top