News

Download: Cyber defense guide for the financial sector

Download: Cyber defense guide for the financial sector 2025-09-09 at 15:46 By Help Net Security Data breaches cost more for financial organizations than they do for those in many other industries. In attempting to strengthen your financial organization’s cybersecurity, you must contend with evolving regulatory obligations, outdated IT infrastructure, and other challenges. How do you

React to this headline:

Loading spinner

Download: Cyber defense guide for the financial sector Read More »

Signal adds secure backup option for chat history

Signal adds secure backup option for chat history 2025-09-09 at 10:52 By Anamarija Pogorelec Losing a phone can mean losing years of conversations. Signal is rolling out a new secure backup feature to help users keep their messages safe without giving up privacy. The problem with lost chats Signal has long avoided cloud backups because

React to this headline:

Loading spinner

Signal adds secure backup option for chat history Read More »

Nearly 500 researchers urge EU to rethink controversial CSAM scanning proposal

Nearly 500 researchers urge EU to rethink controversial CSAM scanning proposal 2025-09-09 at 10:22 By Mirko Zorz Nearly 500 scientists and researchers have signed an open letter warning that the latest version of the EU’s Chat Control Proposal would weaken digital security while failing to deliver meaningful protection for children. The signatories represent 34 countries

React to this headline:

Loading spinner

Nearly 500 researchers urge EU to rethink controversial CSAM scanning proposal Read More »

Ongoing malvertising campaign targets European IT workers with fake GitHub Desktop installers

Ongoing malvertising campaign targets European IT workers with fake GitHub Desktop installers 2025-09-09 at 09:46 By Zeljka Zorz Researchers have spotted a malvertising (and clever malware delivery) campaign targeting IT workers in the European Union with fake GitHub Desktop installers. “We believe the goal of this campaign was to gain initial access to organizations for

React to this headline:

Loading spinner

Ongoing malvertising campaign targets European IT workers with fake GitHub Desktop installers Read More »

Connected cars are racing ahead, but security is stuck in neutral

Connected cars are racing ahead, but security is stuck in neutral 2025-09-09 at 09:46 By Mirko Zorz Connected cars are already on Europe’s roads, loaded with software, sensors, and constant data connections. Drivers love the features these vehicles bring, from remote apps to smart navigation, but each new connection also opens a door to potential

React to this headline:

Loading spinner

Connected cars are racing ahead, but security is stuck in neutral Read More »

Attackers test the limits of railway cybersecurity

Attackers test the limits of railway cybersecurity 2025-09-09 at 08:31 By Sinisa Markovic Railway systems are the lifeblood of many economies, supporting everything from daily passenger transport to military and industrial operations, so the question arises: how secure are they from a cybersecurity perspective? Like all industries, the railway industry is undergoing its digital transformation.

React to this headline:

Loading spinner

Attackers test the limits of railway cybersecurity Read More »

Employees keep feeding AI tools secrets they can’t take back

Employees keep feeding AI tools secrets they can’t take back 2025-09-09 at 08:03 By Anamarija Pogorelec Employees are putting sensitive data into public AI tools, and many organizations don’t have the controls to stop it. A new report from Kiteworks finds that most companies are missing basic safeguards to manage this data. Security control maturity

React to this headline:

Loading spinner

Employees keep feeding AI tools secrets they can’t take back Read More »

Cybersecurity jobs available right now: September 9, 2025

Cybersecurity jobs available right now: September 9, 2025 2025-09-09 at 07:52 By Anamarija Pogorelec Analyst, Cybersecurity DFIR ICE | Singapore | On-site – View job details As an Analyst, Cybersecurity DFIR, you will review and triage user-reported emails to identify phishing, malware, and other threats, taking containment actions and supporting eradication efforts. You will analyze

React to this headline:

Loading spinner

Cybersecurity jobs available right now: September 9, 2025 Read More »

Are we headed for an AI culture war?

Are we headed for an AI culture war? 2025-09-09 at 07:52 By Help Net Security In this Help Net Security video, Matt Fangman, Field CTO at SailPoint, discusses whether an AI culture war is inevitable. He explores the rise of AI agents as a new identity type, the need for guardrails and human supervision, and

React to this headline:

Loading spinner

Are we headed for an AI culture war? Read More »

Salesloft Drift data breach: Investigation reveals how attackers got in

Salesloft Drift data breach: Investigation reveals how attackers got in 2025-09-08 at 14:33 By Zeljka Zorz The attack that resulted in the Salesloft Drift data breach started with the compromise of the company’s GitHub account, Salesloft confirmed this weekend. Supply chain compromise On August 26, the company publicly revealed that earlier that month, a threat

React to this headline:

Loading spinner

Salesloft Drift data breach: Investigation reveals how attackers got in Read More »

Linux Kernel Runtime Guard hits 1.0.0 with major updates and broader support

Linux Kernel Runtime Guard hits 1.0.0 with major updates and broader support 2025-09-08 at 09:52 By Sinisa Markovic The Linux Kernel Runtime Guard (LKRG) is a kernel module that checks the Linux kernel while it’s running. It looks for signs of tampering and tries to catch attempts to exploit security flaws in the kernel. Because

React to this headline:

Loading spinner

Linux Kernel Runtime Guard hits 1.0.0 with major updates and broader support Read More »

Cybersecurity research is getting new ethics rules, here’s what you need to know

Cybersecurity research is getting new ethics rules, here’s what you need to know 2025-09-08 at 09:01 By Mirko Zorz Top cybersecurity conferences are introducing new rules that require researchers to formally address ethics in their work. Starting with the 2026 USENIX Security Symposium, all submissions must include a stakeholder-based ethics analysis. Other major venues such

React to this headline:

Loading spinner

Cybersecurity research is getting new ethics rules, here’s what you need to know Read More »

InterceptSuite: Open-source network traffic interception tool

InterceptSuite: Open-source network traffic interception tool 2025-09-08 at 08:34 By Mirko Zorz InterceptSuite is an open-source, cross-platform network traffic interception tool designed for TLS/SSL inspection, analysis, and manipulation at the network level. “InterceptSuite is designed primarily for non-HTTP protocols, although it does support HTTP/1 and HTTP/2. It offers support for databases, SMTP, and custom protocols,

React to this headline:

Loading spinner

InterceptSuite: Open-source network traffic interception tool Read More »

Cyber defense cannot be democratized

Cyber defense cannot be democratized 2025-09-08 at 08:14 By Help Net Security The democratization of AI has fundamentally lowered the barrier for threat actors, creating a bigger pool of people who can carry out sophisticated attacks. The so-called democratization of security, on the other hand, has resulted in chaos. The problem In an earnest attempt

React to this headline:

Loading spinner

Cyber defense cannot be democratized Read More »

Identity management was hard, AI made it harder

Identity management was hard, AI made it harder 2025-09-08 at 07:33 By Anamarija Pogorelec Identity security is becoming a core part of cybersecurity operations, but many organizations are falling behind. A new report from SailPoint shows that as AI-driven identities and machine accounts grow, most security teams are not prepared to manage them at scale.

React to this headline:

Loading spinner

Identity management was hard, AI made it harder Read More »

AI moves fast, but data security must move faster

AI moves fast, but data security must move faster 2025-09-08 at 07:03 By Anamarija Pogorelec Generative AI is showing up everywhere in the enterprise, from customer service chatbots to marketing campaigns. It promises speed and innovation, but it also brings new and unfamiliar security risks. As companies rush to adopt these tools, many are discovering

React to this headline:

Loading spinner

AI moves fast, but data security must move faster Read More »

Week in review: Several companies affected by the Salesloft Drift breach, Sitecore 0-day vulnerability

Week in review: Several companies affected by the Salesloft Drift breach, Sitecore 0-day vulnerability 2025-09-07 at 11:04 By Help Net Security Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Zscaler, Palo Alto Networks, SpyCloud among the affected by Salesloft Drift breach In the wake of last week’s revelation

React to this headline:

Loading spinner

Week in review: Several companies affected by the Salesloft Drift breach, Sitecore 0-day vulnerability Read More »

Attackers are exploiting critical SAP S/4HANA vulnerability (CVE-2025-42957)

Attackers are exploiting critical SAP S/4HANA vulnerability (CVE-2025-42957) 2025-09-05 at 15:03 By Zeljka Zorz A critical vulnerability (CVE-2025-42957) in SAP S/4HANA enterprise resource planning software is being exploited by attackers “to a limited extent”, the Dutch National Cyber Security Center (NCSC NL) has warned on Friday. Their alert seems to be based on a report

React to this headline:

Loading spinner

Attackers are exploiting critical SAP S/4HANA vulnerability (CVE-2025-42957) Read More »

Stealthy attack serves poisoned web pages only to AI agents

Stealthy attack serves poisoned web pages only to AI agents 2025-09-05 at 14:30 By Zeljka Zorz AI agents can be tricked into covertly performing malicious actions by websites that are hidden from regular users’ view, JFrog AI architect Shaked Zychlinski has found. This novel approach allows attackers to inject prompts / instructions into these autonomous

React to this headline:

Loading spinner

Stealthy attack serves poisoned web pages only to AI agents Read More »

Scroll to Top