News

LLMs can boost cybersecurity decisions, but not for everyone

LLMs can boost cybersecurity decisions, but not for everyone 2025-09-19 at 09:11 By Mirko Zorz LLMs are moving fast from experimentation to daily use in cybersecurity. Teams are starting to use them to sort through threat intelligence, guide incident response, and help analysts handle repetitive work. But adding AI into the decision-making process brings new […]

React to this headline:

Loading spinner

LLMs can boost cybersecurity decisions, but not for everyone Read More »

Shifting supply chains and rules test CPS security strategies

Shifting supply chains and rules test CPS security strategies 2025-09-19 at 08:31 By Sinisa Markovic Cyber-physical systems are getting harder to protect as the business landscape keeps shifting. Economic pressures, supply chain changes, and new regulations are creating more openings for attackers while complicating how organizations manage security. A new report from Claroty, based on

React to this headline:

Loading spinner

Shifting supply chains and rules test CPS security strategies Read More »

Researchers believe Gamaredon and Turla threat groups are collaborating

Researchers believe Gamaredon and Turla threat groups are collaborating 2025-09-19 at 08:31 By Help Net Security ESET Research has discovered evidence of collaboration between the Gamaredon and Turla threat groups. Both groups are linked to Russia’s primary intelligence agency, the FSB, and were found working in tandem to target high-profile organizations in Ukraine. In these

React to this headline:

Loading spinner

Researchers believe Gamaredon and Turla threat groups are collaborating Read More »

The unseen side of malware and how to find it

The unseen side of malware and how to find it 2025-09-19 at 08:31 By Anamarija Pogorelec Security teams rely on threat reports to understand what’s out there and to keep their organizations safe. But a new report shows that these reports might only reveal part of the story. Hidden malware variants are quietly slipping past

React to this headline:

Loading spinner

The unseen side of malware and how to find it Read More »

The real-world effects of EU’s DORA regulation on global businesses

The real-world effects of EU’s DORA regulation on global businesses 2025-09-19 at 08:31 By Help Net Security In this Help Net Security video, Matt Cooper, Director of Governance, Risk, and Compliance at Vanta, discusses the EU’s Digital Operational Resilience Act (DORA) and its effects six months after it went into effect. DORA is the first

React to this headline:

Loading spinner

The real-world effects of EU’s DORA regulation on global businesses Read More »

New infosec products of the week: September 19, 2025

New infosec products of the week: September 19, 2025 2025-09-19 at 07:09 By Anamarija Pogorelec Here’s a look at the most interesting products from the past week, featuring releases from Absolute Security, Catchpoint, Nagomi Security, Neon Cyber, and QuSecure. Absolute Security Rehydrate restores compromised endpoints Rehydrate delivers business continuity endpoint restoration through a fully remote,

React to this headline:

Loading spinner

New infosec products of the week: September 19, 2025 Read More »

SonicWall says attackers compromised some firewall configuration backup files

SonicWall says attackers compromised some firewall configuration backup files 2025-09-18 at 18:49 By Zeljka Zorz Between attackers exploiting 0-day and n-day vulnerabilities in the company’s firewalls and Secure Mobile Access appliances, SonicWall and its customers have had a tough year. And, unfortunately for them, the troubles are not over: unknown attackers have managed to brute-force

React to this headline:

Loading spinner

SonicWall says attackers compromised some firewall configuration backup files Read More »

Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)

Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585) 2025-09-18 at 16:00 By Zeljka Zorz Google has released a security update for the Chrome stable channel to fix a zero‑day vulnerability (CVE-2025-10585) reported by its Threat Analysis Group (TAG) on Tuesday. “Google is aware that an exploit for CVE-2025-10585 exists in the wild,” the company announced.

React to this headline:

Loading spinner

Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585) Read More »

LinkedIn now uses your data for AI by default, opt out now!

LinkedIn now uses your data for AI by default, opt out now! 2025-09-18 at 16:00 By Sinisa Markovic LinkedIn is making major changes to its User Agreement and Privacy Policy, effective November 3, 2025. Among the most notable updates, the company will now use member data by default to improve its generative AI models, unless

React to this headline:

Loading spinner

LinkedIn now uses your data for AI by default, opt out now! Read More »

Behind the scenes of cURL with its founder: Releases, updates, and security

Behind the scenes of cURL with its founder: Releases, updates, and security 2025-09-18 at 09:01 By Mirko Zorz In this Help Net Security interview, Daniel Stenberg, lead developer od cURL, discusses how the widely used tool remains secure across billions of devices, from cloud services to IoT. He shares insights into cURL’s decades-long journey of

React to this headline:

Loading spinner

Behind the scenes of cURL with its founder: Releases, updates, and security Read More »

Product showcase: Exaforce – The full lifecycle AI SOC platform

Product showcase: Exaforce – The full lifecycle AI SOC platform 2025-09-18 at 09:01 By Help Net Security Today’s SOCs face an impossible equation: too much noise, too many gaps, and too few hands. Detection coverage gaps leave companies exposed, false positives overwhelm analysts, manual investigations eat up valuable hours from the most expensive assets (experienced

React to this headline:

Loading spinner

Product showcase: Exaforce – The full lifecycle AI SOC platform Read More »

Shadow AI is breaking corporate security from within

Shadow AI is breaking corporate security from within 2025-09-18 at 08:26 By Anamarija Pogorelec Cybersecurity leaders know the attack surface has been growing for years, but the latest State of Information Security Report 2025 from IO shows how fast new risks are converging. Drawing on responses from more than 3,000 security professionals in the UK

React to this headline:

Loading spinner

Shadow AI is breaking corporate security from within Read More »

AI made crypto scams far more dangerous

AI made crypto scams far more dangerous 2025-09-18 at 08:26 By Sinisa Markovic The first half of 2025 saw one of the worst waves of crypto hacks to date, with more than $3.01 billion stolen. AI was a big part of it, making scams easier to run and letting even low-skill criminals get in on

React to this headline:

Loading spinner

AI made crypto scams far more dangerous Read More »

Global hiring risks: What you need to know about identity fraud and screening trends

Global hiring risks: What you need to know about identity fraud and screening trends 2025-09-18 at 07:10 By Anamarija Pogorelec Hiring new employees has always carried some risk, but that risk is growing in new ways, and identity fraud is becoming more common in the hiring process. HireRight’s 2025 Global Benchmark Report takes a close

React to this headline:

Loading spinner

Global hiring risks: What you need to know about identity fraud and screening trends Read More »

Many networking devices are still vulnerable to pixie dust attack

Many networking devices are still vulnerable to pixie dust attack 2025-09-17 at 18:22 By Zeljka Zorz Despite having been discovered and reported in 2014, the vulnerability that allows pixie dust attacks still impacts consumer and SOHO networking equipment around the world, Netrise researchers have confirmed. WPS and the pixie dust attack Wi-Fi Protected Setup (WPS)

React to this headline:

Loading spinner

Many networking devices are still vulnerable to pixie dust attack Read More »

Microsoft disrupts the RaccoonO365 Phishing-as-a-Service operation, names alleged leader

Microsoft disrupts the RaccoonO365 Phishing-as-a-Service operation, names alleged leader 2025-09-17 at 15:23 By Zeljka Zorz Microsoft and Cloudflare have disrupted a Phishing-as-a-Service operation selling the RaccoonO365 kit for stealing Microsoft 365 account credentials. “Using a court order granted by the Southern District of New York, [we] seized 338 websites associated with the popular service, disrupting

React to this headline:

Loading spinner

Microsoft disrupts the RaccoonO365 Phishing-as-a-Service operation, names alleged leader Read More »

How a fake ICS network can reveal real cyberattacks

How a fake ICS network can reveal real cyberattacks 2025-09-17 at 09:03 By Mirko Zorz Researchers have introduced a new way to study and defend against ICS threats. Their project, called ICSLure, is a honeynet built to closely mimic a real industrial environment. Why traditional honeypots fall short Honeypots are systems designed to attract attackers

React to this headline:

Loading spinner

How a fake ICS network can reveal real cyberattacks Read More »

Creating a compliance strategy that works across borders

Creating a compliance strategy that works across borders 2025-09-17 at 08:37 By Mirko Zorz In this Help Net Security interview, Marco Goldberg, Managing Director at EQS Group, discusses how compliance and regulation are evolving worldwide. He talks about how organizations can stay compliant with international rules while keeping their systems practical and user-friendly. Goldberg points

React to this headline:

Loading spinner

Creating a compliance strategy that works across borders Read More »

Rayhunter: EFF releases open-source tool to detect cellular spying

Rayhunter: EFF releases open-source tool to detect cellular spying 2025-09-17 at 08:12 By Anamarija Pogorelec The Electronic Frontier Foundation (EFF) has released Rayhunter, a new open-source tool designed to detect cell site simulators (CSS). These devices, also known as IMSI catchers or Stingrays, mimic cell towers to trick phones into connecting so they can collect

React to this headline:

Loading spinner

Rayhunter: EFF releases open-source tool to detect cellular spying Read More »

Old file types, new tricks: Attackers turn everyday files into weapons

Old file types, new tricks: Attackers turn everyday files into weapons 2025-09-17 at 07:44 By Anamarija Pogorelec Attackers are finding new ways to blend in with everyday business tools, hiding their activity inside formats and processes that workers and IT teams often trust. The latest quarterly Threat Insights Report from HP Wolf Security shows how

React to this headline:

Loading spinner

Old file types, new tricks: Attackers turn everyday files into weapons Read More »

Scroll to Top