News

Third-party cyber risks and what you can do

Third-party cyber risks and what you can do 2025-05-21 at 07:31 By Help Net Security When a third-party tech vendor suffers a cyber incident, your business can feel the effects immediately. That’s why it’s crucial to treat vendor risk as part of your cybersecurity posture. In this Help Net Security video, Mike Toole, Director of […]

React to this headline:

Loading spinner

Third-party cyber risks and what you can do Read More »

Nation-state APTs ramp up attacks on Ukraine and the EU

Nation-state APTs ramp up attacks on Ukraine and the EU 2025-05-21 at 07:02 By Help Net Security Russian APT groups intensified attacks against Ukraine and the EU, exploiting zero-day vulnerabilities and deploying wipers, according to ESET. Ukraine faces rising cyber threats The Russia-aligned Sandworm group intensified destructive operations against Ukrainian energy companies, deploying a new

React to this headline:

Loading spinner

Nation-state APTs ramp up attacks on Ukraine and the EU Read More »

Product showcase: Secure digital and physical access with the Swissbit iShield Key 2

Product showcase: Secure digital and physical access with the Swissbit iShield Key 2 2025-05-20 at 16:16 By Help Net Security To meet today’s complex security requirements, organizations need solutions that are not only secure, but also practical and scalable. The Swissbit iShield Key 2 offers a compelling answer by combining two critical security functions –

React to this headline:

Loading spinner

Product showcase: Secure digital and physical access with the Swissbit iShield Key 2 Read More »

Trojanized KeePass opens doors for ransomware attackers

Trojanized KeePass opens doors for ransomware attackers 2025-05-20 at 14:04 By Zeljka Zorz A suspected initial access broker has been leveraging trojanized versions of the open-source KeePass password manager to set the stage for ransomware attacks, WithSecure researchers have discovered. KeeLoader: Passoword manager that acts as data stealer and malware loader In February 2025, WithSecure’s

React to this headline:

Loading spinner

Trojanized KeePass opens doors for ransomware attackers Read More »

The Windows Subsystem for Linux goes open source

The Windows Subsystem for Linux goes open source 2025-05-20 at 12:47 By Anamarija Pogorelec Microsoft has officially open-sourced the Windows Subsystem for Linux (WSL), closing the very first issue ever filed on the Microsoft/WSL GitHub repository: “Will this be open source?” WSL allows developers to run unmodified Linux command-line tools, utilities, and applications directly on

React to this headline:

Loading spinner

The Windows Subsystem for Linux goes open source Read More »

Closing security gaps in multi-cloud and SaaS environments

Closing security gaps in multi-cloud and SaaS environments 2025-05-20 at 09:06 By Mirko Zorz In this Help Net Security interview, Kunal Modasiya, SVP, Product Management, GTM, and Growth at Qualys, discusses recent Qualys research on the state of cloud and SaaS security. He talks about how siloed visibility, fragmented tools, and a lack of incident

React to this headline:

Loading spinner

Closing security gaps in multi-cloud and SaaS environments Read More »

Containers are just processes: The illusion of namespace security

Containers are just processes: The illusion of namespace security 2025-05-20 at 08:31 By Help Net Security In the early days of commercial open source, major vendors cast doubt on its security, claiming transparency was a flaw. In fact, that openness fueled strong communities and faster security improvements, making OSS often more secure than proprietary code.

React to this headline:

Loading spinner

Containers are just processes: The illusion of namespace security Read More »

Why legal must lead on AI governance before it’s too late

Why legal must lead on AI governance before it’s too late 2025-05-20 at 08:05 By Mirko Zorz In this Help Net Security interview, Brooke Johnson, Chief Legal Counsel and SVP of HR and Security, Ivanti, explores the legal responsibilities in AI governance, highlighting how cross-functional collaboration enables safe, ethical AI use while mitigating risk and

React to this headline:

Loading spinner

Why legal must lead on AI governance before it’s too late Read More »

AI voice hijacking: How well can you trust your ears?

AI voice hijacking: How well can you trust your ears? 2025-05-20 at 07:32 By Sinisa Markovic How sure are you that you can recognize an AI-cloned voice? If you think you’re completely certain, you might be wrong. Why it’s a growing threat With only three seconds of audio, criminals can now clone a person’s voice,

React to this headline:

Loading spinner

AI voice hijacking: How well can you trust your ears? Read More »

It’s Time to Prepare as Scattered Spider Spreads Its Web to the US

It’s Time to Prepare as Scattered Spider Spreads Its Web to the US 2025-05-19 at 22:08 By DFIR: Enhance your cybersecurity resilience with Trustwave’s DFIR retainer services, offering rapid response, priority handling, and cost-efficient solutions to manage digital forensics and incident response effectively. Offensive Security: Protect retail operations against emerging threats like Scattered Spider with Trustwave’s Offensive

React to this headline:

Loading spinner

It’s Time to Prepare as Scattered Spider Spreads Its Web to the US Read More »

CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide

CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide 2025-05-19 at 16:50 By Anamarija Pogorelec A phishing operation that targets corporate banking accounts across the globe has been analyzed in a new report by CTM360. The campaign uses fake Google ads, advanced filtering techniques, to steal sensitive login credentials and bypass MFA. Researchers uncovered

React to this headline:

Loading spinner

CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide Read More »

Trustwave Launches MailMarshal Integrated Cloud to Enhance Email Security for Microsoft 365 Environments

Trustwave Launches MailMarshal Integrated Cloud to Enhance Email Security for Microsoft 365 Environments 2025-05-19 at 16:01 By Discover how Trustwave MailMarshal Integrated Cloud enhances your Microsoft 365 environment security. Learn how Trustwave MailMarshal Integrated Cloud’s API-seamlessly integrates with M365. Trustwave MailMarshal secure email service now offers an integrated cloud solution to bolster your defenses against

React to this headline:

Loading spinner

Trustwave Launches MailMarshal Integrated Cloud to Enhance Email Security for Microsoft 365 Environments Read More »

Malicious RVTools installer found on official site, researcher warns

Malicious RVTools installer found on official site, researcher warns 2025-05-19 at 15:05 By Zeljka Zorz The official site for RVTools has apparently been hacked to serve a compromised installer for the popular utility, a security researcher has warned. It’s difficult to say how long the malicious version has been available for download, but the website

React to this headline:

Loading spinner

Malicious RVTools installer found on official site, researcher warns Read More »

AI hallucinations and their risk to cybersecurity operations

AI hallucinations and their risk to cybersecurity operations 2025-05-19 at 08:31 By Mirko Zorz AI systems can sometimes produce outputs that are incorrect or misleading, a phenomenon known as hallucinations. These errors can range from minor inaccuracies to misrepresentations that can misguide decision-making processes. Real world implications “If a company’s AI agent leverages outdated or

React to this headline:

Loading spinner

AI hallucinations and their risk to cybersecurity operations Read More »

Why EU encryption policy needs technical and civil society input

Why EU encryption policy needs technical and civil society input 2025-05-19 at 08:02 By Mirko Zorz In this Help Net Security interview, Full Professor at University of Leuven, unpacks the European Commission’s encryption agenda, urging a balanced, technically informed approach to lawful access that safeguards privacy, security, and fundamental rights across the EU. Given the

React to this headline:

Loading spinner

Why EU encryption policy needs technical and civil society input Read More »

Hanko: Open-source authentication and user management

Hanko: Open-source authentication and user management 2025-05-19 at 07:32 By Mirko Zorz Hanko is an open-source, API-first authentication solution purpose-built for the passwordless era. “We focus on helping developers and organizations modernize their authentication flows by migrating users towards passkeys, while still supporting all common authentication methods like email/password, MFA, OAuth, as well as SAML

React to this headline:

Loading spinner

Hanko: Open-source authentication and user management Read More »

Inside MITRE ATT&CK v17: Smarter defenses, sharper threat intel

Inside MITRE ATT&CK v17: Smarter defenses, sharper threat intel 2025-05-19 at 07:04 By Help Net Security In this Help Net Security video, Adam Pennington, MITRE ATT&CK Lead, breaks down what’s new in the ATT&CK v17 release. He highlights the addition of the ESXi platform, new and updated techniques for Linux, refinements to mitigation guidance, and

React to this headline:

Loading spinner

Inside MITRE ATT&CK v17: Smarter defenses, sharper threat intel Read More »

Week in review: Microsoft patches 5 actively exploited 0-days, recently fixed Chrome vulnerability exploited

Week in review: Microsoft patches 5 actively exploited 0-days, recently fixed Chrome vulnerability exploited 2025-05-18 at 11:04 By Help Net Security Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Patch Tuesday: Microsoft fixes 5 actively exploited zero-days On May 2025 Patch Tuesday, Microsoft has released security fixes for

React to this headline:

Loading spinner

Week in review: Microsoft patches 5 actively exploited 0-days, recently fixed Chrome vulnerability exploited Read More »

CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)

CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664) 2025-05-16 at 13:47 By Zeljka Zorz A high-severity Chrome vulnerability (CVE-2025-4664) that Google has fixed on Wednesday is being leveraged by attackers, CISA has confirmed by adding the flaw to its Known Exploited Vulnerabilities catalog. About CVE-2025-4664 CVE-2025-4664 stems from insufficient policy enforcement in Google

React to this headline:

Loading spinner

CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664) Read More »

Scroll to Top