News

Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK

Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK 2025-03-19 at 07:16 By Help Net Security Advanced Data Protection (ADP) secures iCloud data with end-to-end encryption. This ensures that no one, not even Apple, can access the encrypted data, which remains secure even in the event of a cloud breach. As […]

React to this headline:

Loading spinner

Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK Read More »

The rise of DAST 2.0 in 2025

The rise of DAST 2.0 in 2025 2025-03-18 at 18:02 By Help Net Security Static Application Security Testing (SAST) found favor among security teams as an easy way to deploy security testing without really engaging developers. With the ability to analyze source code early in the software delivery lifecycle, SAST solutions offered a more proactive

React to this headline:

Loading spinner

The rise of DAST 2.0 in 2025 Read More »

How AI and automation are reshaping security leadership

How AI and automation are reshaping security leadership 2025-03-18 at 16:02 By Help Net Security The contemporary SOC is transforming as it starts to realize the benefits of GenAI and utilize the manifestations of autonomous agentic AI, according to Tines. Additionally, the promise of security automation is coming to fruition. In theory and practice, security

React to this headline:

Loading spinner

How AI and automation are reshaping security leadership Read More »

Stealthy StilachiRAT steals data, may enable lateral movement

Stealthy StilachiRAT steals data, may enable lateral movement 2025-03-18 at 15:48 By Zeljka Zorz While still not widely distributed, a new Windows remote access trojan (RAT) dubbed StilachiRAT is a serious threat. “[The malware] demonstrates sophisticated techniques to evade detection, persist in the target environment, and exfiltrate sensitive data,” Microsoft threat analysts have warned on

React to this headline:

Loading spinner

Stealthy StilachiRAT steals data, may enable lateral movement Read More »

FBI: Free file converter sites and tools deliver malware

FBI: Free file converter sites and tools deliver malware 2025-03-18 at 13:35 By Zeljka Zorz Malware peddlers are increasingly targeting users who are searching for free file converter services (websites) and tools, the FBI’s Denver Field Office has warned earlier this month. “To conduct this scheme, cyber criminals across the globe are using any type

React to this headline:

Loading spinner

FBI: Free file converter sites and tools deliver malware Read More »

How financial institutions can minimize their attack surface

How financial institutions can minimize their attack surface 2025-03-18 at 08:01 By Mirko Zorz In this Help Net Security interview, Sunil Mallik, CISO of Discover Financial Services, discusses cybersecurity threats for financial institutions. He also shares insights on balancing compliance with agility, lessons from regulatory audits, and Discover’s approach to risk management and workforce development.

React to this headline:

Loading spinner

How financial institutions can minimize their attack surface Read More »

Hackers target AI and crypto as software supply chain risks grow

Hackers target AI and crypto as software supply chain risks grow 2025-03-18 at 07:47 By Help Net Security The growing sophistication of software supply chain attacks is driven by widespread flaws in open-source and third-party commercial software, along with malicious campaigns that specifically target AI and cryptocurrency development pipelines, according to a ReversingLabs report. According

React to this headline:

Loading spinner

Hackers target AI and crypto as software supply chain risks grow Read More »

Cybersecurity jobs available right now: March 18, 2025

Cybersecurity jobs available right now: March 18, 2025 2025-03-18 at 07:02 By Anamarija Pogorelec Application Security Expert monday.com | United Kingdom | Hybrid – View job details As an Application Security Expert, you will provide guidance on security best practices and compliance, and undertake security testing. Develop security testing plans and integrate them into the

React to this headline:

Loading spinner

Cybersecurity jobs available right now: March 18, 2025 Read More »

How to encrypt and secure sensitive files on macOS

How to encrypt and secure sensitive files on macOS 2025-03-17 at 18:14 By Anamarija Pogorelec Encrypting files keeps sensitive data like personal details, finances, and passwords safe from attackers by making them unreadable to unauthorized users. Encryption also safeguards data in case of device loss or theft, preventing malicious actors from accessing or misusing the

React to this headline:

Loading spinner

How to encrypt and secure sensitive files on macOS Read More »

Review: Cybersecurity Tabletop Exercises

Review: Cybersecurity Tabletop Exercises 2025-03-17 at 07:31 By Mirko Zorz Packed with real-world case studies and practical examples, Cybersecurity Tabletop Exercises offers insights into how organizations have successfully leveraged tabletop exercises to identify security gaps and enhance their incident response strategies. The authors explore a range of realistic scenarios, including phishing campaigns, ransomware attacks, and

React to this headline:

Loading spinner

Review: Cybersecurity Tabletop Exercises Read More »

IntelMQ: Open-source tool for collecting and processing security feeds

IntelMQ: Open-source tool for collecting and processing security feeds 2025-03-17 at 07:02 By Mirko Zorz IntelMQ is an open-source solution designed to help IT security teams (including CERTs, CSIRTs, SOCs, and abuse departments) streamline the collection and processing of security feeds using a message queuing protocol. “Originally designed for CSIRTs and later adopted by SOCs,

React to this headline:

Loading spinner

IntelMQ: Open-source tool for collecting and processing security feeds Read More »

Week in review: NIST selects HQC for post-quantum encryption, 10 classic cybersecurity books

Week in review: NIST selects HQC for post-quantum encryption, 10 classic cybersecurity books 2025-03-16 at 11:01 By Help Net Security Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: NIST selects HQC as backup algorithm for post-quantum encryption Last year, NIST standardized a set of encryption algorithms that can

React to this headline:

Loading spinner

Week in review: NIST selects HQC for post-quantum encryption, 10 classic cybersecurity books Read More »

Quantifying cyber risk strategies to resonate with CFOs and boards

Quantifying cyber risk strategies to resonate with CFOs and boards 2025-03-14 at 17:02 By Mirko Zorz In this Help Net Security interview, Mir Kashifuddin, Data Risk & Privacy Leader at PwC, discusses how CISOs can translate cyber risk into business value and secure a more strategic role within their organizations. He explains that aligning cybersecurity

React to this headline:

Loading spinner

Quantifying cyber risk strategies to resonate with CFOs and boards Read More »

Top 5 threats keeping CISOs up at night in 2025

Top 5 threats keeping CISOs up at night in 2025 2025-03-14 at 08:05 By Help Net Security Cyber threats in 2025 require a proactive, adaptive approach. To stay ahead, CISOs must balance technical defenses, regulatory expectations, and human factors. By prioritizing AI-driven security, ransomware resilience, supply chain risk management, insider threat mitigation, and compliance preparedness,

React to this headline:

Loading spinner

Top 5 threats keeping CISOs up at night in 2025 Read More »

94% of Wi-Fi networks lack protection against deauthentication attacks

94% of Wi-Fi networks lack protection against deauthentication attacks 2025-03-14 at 07:34 By Help Net Security A recent report from Nozomi Networks Labs, based on an analysis of over 500,000 wireless networks worldwide, reveals that only 6% are adequately protected against wireless deauthentication attacks. Most wireless networks, including those in mission-critical environments, remain highly exposed

React to this headline:

Loading spinner

94% of Wi-Fi networks lack protection against deauthentication attacks Read More »

New infosec products of the week: March 14, 2025

New infosec products of the week: March 14, 2025 2025-03-14 at 07:01 By Help Net Security Here’s a look at the most interesting products from the past week, featuring releases from Alloy, Detectify, Pondurance, and SimSpace. SimSpace Stack Optimizer allows organizations to measure their security technologies Stack Optimizer is designed to help organizations make informed,

React to this headline:

Loading spinner

New infosec products of the week: March 14, 2025 Read More »

CISOs, are your medical devices secure? Attackers are watching closely

CISOs, are your medical devices secure? Attackers are watching closely 2025-03-13 at 08:02 By Mirko Zorz The adoption of connected medical devices, collectively called the Internet of Medical Things (IoMT), has transformed patient care. However, this technological advancement has also introduced cybersecurity challenges to safeguard patient safety and uphold organizational security. Securing IoMT: Prioritizing risks

React to this headline:

Loading spinner

CISOs, are your medical devices secure? Attackers are watching closely Read More »

Cybersecurity classics: 10 books that shaped the industry

Cybersecurity classics: 10 books that shaped the industry 2025-03-13 at 07:32 By Help Net Security Cybersecurity constantly evolves, but some books have stood the test of time, shaping how professionals think about security, risk, and digital threats. Whether you’re a CISO, a seasoned expert, or cybersecurity enthusiast, these must-reads belong on your shelf. Masters of

React to this headline:

Loading spinner

Cybersecurity classics: 10 books that shaped the industry Read More »

Scroll to Top