News

The final frontier of cybersecurity is now in space

The final frontier of cybersecurity is now in space 2025-07-29 at 08:11 By Sinisa Markovic As the space sector becomes more commercial and military-focused, these assets are becoming attractive targets. The global space economy is booming and is expected to increase from $630 billion in 2023 to $1.8 trillion by 2035. This means the need […]

React to this headline:

Loading spinner

The final frontier of cybersecurity is now in space Read More »

Inside the application security crisis no one wants to talk about

Inside the application security crisis no one wants to talk about 2025-07-29 at 07:50 By Anamarija Pogorelec Despite knowing the risks, most organizations are still shipping insecure software. That’s one of the stark findings from Cypress Data Defense’s 2025 State of Application Security report, which reveals a worsening crisis in software security. According to the

React to this headline:

Loading spinner

Inside the application security crisis no one wants to talk about Read More »

Cybersecurity jobs available right now: July 29, 2025

Cybersecurity jobs available right now: July 29, 2025 2025-07-29 at 07:09 By Anamarija Pogorelec Cyber Incident Responder Accenture | Ireland | Hybrid – View job details As a Cyber Incident Responder, you will identify and investigate intrusions to determine the cause and extent of the breach, by leveraging EDR, SIEM, and threat intelligence sources. Conduct

React to this headline:

Loading spinner

Cybersecurity jobs available right now: July 29, 2025 Read More »

Your supply chain security strategy might be missing the biggest risk

Your supply chain security strategy might be missing the biggest risk 2025-07-28 at 09:03 By Help Net Security Third-party involvement in data breaches has doubled this year from 15 percent to nearly 30 percent. In response, many organizations have sharpened their focus on third-party risk management, carefully vetting the security practices of their vendors. However,

React to this headline:

Loading spinner

Your supply chain security strategy might be missing the biggest risk Read More »

The legal minefield of hacking back

The legal minefield of hacking back 2025-07-28 at 08:57 By Mirko Zorz In this Help Net Security interview, Gonçalo Magalhães, Head of Security at Immunefi, discusses the legal and ethical implications of hacking back in cross-border cyber incidents. He warns that offensive cyber actions risk violating international law, escalating conflicts, and harming innocent third parties.

React to this headline:

Loading spinner

The legal minefield of hacking back Read More »

Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilities

Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilities 2025-07-28 at 08:13 By Mirko Zorz Vulnhuntr is an open-source tool that finds remotely exploitable vulnerabilities. It uses LLMs and static code analysis to trace how data moves through an application, from user input to server output. This helps it spot complex, multi-step vulnerabilities that traditional tools

React to this headline:

Loading spinner

Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilities Read More »

Review: LLM Engineer’s Handbook

Review: LLM Engineer’s Handbook 2025-07-28 at 07:34 By Mirko Zorz For all the excitement around LLMs, practical, engineering-focused guidance remains surprisingly hard to find. LLM Engineer’s Handbook aims to fill that gap. About the authors Paul Iusztin is a Senior AI Engineer and founder of Decoding ML, a channel for content on learning how to

React to this headline:

Loading spinner

Review: LLM Engineer’s Handbook Read More »

How to fight document fraud with the latest tech tools

How to fight document fraud with the latest tech tools 2025-07-28 at 07:07 By Help Net Security In this Help Net Security video, Thomas Berndorfer, CEO of Connecting Software, explores cutting-edge technologies designed to detect and prevent document forgery and digital fraud. He presents four key approaches to verifying document authenticity: IDVT, PKI, AI-based methods,

React to this headline:

Loading spinner

How to fight document fraud with the latest tech tools Read More »

Week in review: Microsoft SharePoint servers under attack, landing your first cybersecurity job

Week in review: Microsoft SharePoint servers under attack, landing your first cybersecurity job 2025-07-27 at 11:36 By Help Net Security Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft pins on-prem SharePoint attacks on Chinese threat actors As Microsoft continues to update its customer guidance for protecting on-prem

React to this headline:

Loading spinner

Week in review: Microsoft SharePoint servers under attack, landing your first cybersecurity job Read More »

The Danger of Weak Passwords: UK Trucking Firm Attacked and Permanently Shut Down

The Danger of Weak Passwords: UK Trucking Firm Attacked and Permanently Shut Down 2025-07-25 at 20:18 By Discover how a single weak password led to a UK trucking firm’s permanent shutdown by a ransomware attack, highlighting the critical link between passwords and enterprise cybersecurity. Learn actionable strategies for creating strong passwords and implementing broader cybersecurity

React to this headline:

Loading spinner

The Danger of Weak Passwords: UK Trucking Firm Attacked and Permanently Shut Down Read More »

Digital sovereignty becomes a matter of resilience for Europe

Digital sovereignty becomes a matter of resilience for Europe 2025-07-25 at 08:37 By Mirko Zorz In this Help Net Security interview, Benjamin Schilz, CEO of Wire, discusses Europe’s push for digital sovereignty through initiatives like Gaia-X and the EU AI Act. As the continent redefines its technological future, the focus shifts from regulation to building

React to this headline:

Loading spinner

Digital sovereignty becomes a matter of resilience for Europe Read More »

What 50 companies got wrong about cloud identity security

What 50 companies got wrong about cloud identity security 2025-07-25 at 08:07 By Anamarija Pogorelec Most organizations still miss basic identity security controls in the cloud, leaving them exposed to breaches, audit failures, and compliance violations. A new midyear benchmark from Unosecur found that nearly every company scanned had at least one high-risk issue, with

React to this headline:

Loading spinner

What 50 companies got wrong about cloud identity security Read More »

Six months into DORA, most financial firms are still not ready

Six months into DORA, most financial firms are still not ready 2025-07-25 at 07:57 By Help Net Security It’s been six months since the EU’s Digital Operational Resilience Act (DORA) came into effect, but a new Censuswide survey shows that nearly all financial services organizations in EMEA still feel unprepared. An overwhelming 96% of respondents

React to this headline:

Loading spinner

Six months into DORA, most financial firms are still not ready Read More »

New infosec products of the week: July 25, 2025

New infosec products of the week: July 25, 2025 2025-07-25 at 07:02 By Sinisa Markovic Here’s a look at the most interesting products from the past week, featuring releases from Akeyless, Bitdefender, Malwarebytes, ManageEngine, PlexTrac, and Seemplicity. PlexTrac Workflow Automation Engine enhancements accelerate time to remediation PlexTrac launched enhanced Workflow Automation Engine, a major product

React to this headline:

Loading spinner

New infosec products of the week: July 25, 2025 Read More »

Storm-2603 spotted deploying ransomware on exploited SharePoint servers

Storm-2603 spotted deploying ransomware on exploited SharePoint servers 2025-07-24 at 19:03 By Zeljka Zorz One of the groups that, in the past few weeks, has been exploiting vulnerabilities in on-prem SharePoint installation has been observed deploying Warlock ransomware, Microsoft shared on Wednesday. First attack spotted on July 7th On Saturday, Microsoft announced that attackers have

React to this headline:

Loading spinner

Storm-2603 spotted deploying ransomware on exploited SharePoint servers Read More »

Sonicwall fixes critical flaw in SMA appliances, urges customers to check for compromise (CVE-2025-40599)

Sonicwall fixes critical flaw in SMA appliances, urges customers to check for compromise (CVE-2025-40599) 2025-07-24 at 13:19 By Zeljka Zorz Sonicwall is asking customers running specific Secure Mobile Access (SMA) 100 Series devices to patch a newly uncovered vulnerability (CVE-2025-40599) as soon as possible. “While there is currently no evidence that this vulnerability is being

React to this headline:

Loading spinner

Sonicwall fixes critical flaw in SMA appliances, urges customers to check for compromise (CVE-2025-40599) Read More »

Why outsourcing cybersecurity is rising in the Adriatic region

Why outsourcing cybersecurity is rising in the Adriatic region 2025-07-24 at 11:57 By Mirko Zorz In this Help Net Security interview, Aleksandar Stančin, Board Member Adriatics, Exclusive Networks, discusses the state of cybersecurity in the Adriatic region. He talks about how local markets often lag behind EU regulations, despite facing threats comparable to those in

React to this headline:

Loading spinner

Why outsourcing cybersecurity is rising in the Adriatic region Read More »

Autoswagger: Open-source tool to expose hidden API authorization flaws

Autoswagger: Open-source tool to expose hidden API authorization flaws 2025-07-24 at 11:57 By Help Net Security Autoswagger is a free, open-source tool that scans OpenAPI-documented APIs for broken authorization vulnerabilities. These flaws are still common, even at large enterprises with mature security teams, and are especially dangerous because they can be exploited with little technical

React to this headline:

Loading spinner

Autoswagger: Open-source tool to expose hidden API authorization flaws Read More »

Most data breaches have unknown causes as transparency continues to fall

Most data breaches have unknown causes as transparency continues to fall 2025-07-24 at 11:57 By Help Net Security The Identity Theft Resource Center (ITRC) reports 1,732 publicly disclosed data breaches in H1 2025, marking a 5% increase over the same period in 2024. The ITRC could track a record number of compromises in 2025 if

React to this headline:

Loading spinner

Most data breaches have unknown causes as transparency continues to fall Read More »

Your app is under attack every 3 minutes

Your app is under attack every 3 minutes 2025-07-24 at 11:57 By Help Net Security Application-layer attacks have become one of the most common and consequential methods adversaries use to gain access and compromise organizations, according to Contrast Security. These attacks target the custom code, APIs, and logic that power applications, often slipping past detection

React to this headline:

Loading spinner

Your app is under attack every 3 minutes Read More »

Scroll to Top