News

Product showcase: Neo Network Utility makes network checks simple

Product showcase: Neo Network Utility makes network checks simple 2025-10-27 at 08:46 By Anamarija Pogorelec Want to see if a remote server is still alive, or trace the path your data takes across the internet? Network Utility had you covered, until Apple removed it. Network Utility was the go-to macOS app for quick network checks. […]

React to this headline:

Loading spinner

Product showcase: Neo Network Utility makes network checks simple Read More »

AI writes code like a junior dev, and security is feeling it

AI writes code like a junior dev, and security is feeling it 2025-10-27 at 08:46 By Anamarija Pogorelec The industry is entering a phase where code is being deployed faster than it can be secured, according to OX Security. Findings from the Army of Juniors: The AI Code Security Crisis report show that AI-generated code

React to this headline:

Loading spinner

AI writes code like a junior dev, and security is feeling it Read More »

Week in review: Actively exploited Windows SMB flaw, trusted OAuth apps turned into cloud backdoors

Week in review: Actively exploited Windows SMB flaw, trusted OAuth apps turned into cloud backdoors 2025-10-26 at 11:46 By Help Net Security Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Most AI privacy research looks the wrong way Most research on LLM privacy has focused on the wrong

React to this headline:

Loading spinner

Week in review: Actively exploited Windows SMB flaw, trusted OAuth apps turned into cloud backdoors Read More »

Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)

Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287) 2025-10-24 at 15:38 By Zeljka Zorz Microsoft has released an out-of-band security update that “comprehensively” addresses CVE-2025-59287, a remote code execution vulnerability in the Windows Server Update Services (WSUS) that is reportedly being exploited in the wild. About CVE-2025-59287 WSUS is a tool that helps

React to this headline:

Loading spinner

Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287) Read More »

Microsoft blocks risky file previews in Windows File Explorer

Microsoft blocks risky file previews in Windows File Explorer 2025-10-24 at 15:38 By Zeljka Zorz Along with fixing many code-based vulnerabilities, the October 2025 Windows updates also change how File Explorer handles files downloaded from the internet. The change affects the file management tool’s Preview Pane, which lets users see the contents of a file

React to this headline:

Loading spinner

Microsoft blocks risky file previews in Windows File Explorer Read More »

What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense

What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense 2025-10-24 at 10:42 By Anamarija Pogorelec Adversaries are using AI to sharpen attacks, automate operations, and challenge long-standing defenses, according to a new Microsoft report. Researchers describe a year in which criminal and state-backed actors blurred the lines between cybercrime, espionage, and

React to this headline:

Loading spinner

What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense Read More »

Building trust in AI: How to keep humans in control of cybersecurity

Building trust in AI: How to keep humans in control of cybersecurity 2025-10-24 at 10:42 By Help Net Security In this Help Net Security video, Rekha Shenoy, CEO at BackBox, takes a look at AI in cybersecurity, separating hype from reality. She explains why AI’s true value lies not in replacing human expertise but in

React to this headline:

Loading spinner

Building trust in AI: How to keep humans in control of cybersecurity Read More »

Smart helmet tech points to the future of fighting audio deepfakes

Smart helmet tech points to the future of fighting audio deepfakes 2025-10-24 at 10:42 By Sinisa Markovic Voice cloning has become fast, cheap, and convincing. With only a few minutes of recorded speech, generative models can recreate a person’s voice with matching tone, rhythm, and accent. To address that risk, a research team at Texas

React to this headline:

Loading spinner

Smart helmet tech points to the future of fighting audio deepfakes Read More »

New infosec products of the week: October 24, 2025

New infosec products of the week: October 24, 2025 2025-10-24 at 10:42 By Anamarija Pogorelec Here’s a look at the most interesting products from the past week, featuring releases from Axoflow, Elastic, Illumio, Keycard, Netscout and Rubrik. Axoflow Security Data Layer unifies data pipeline, storage, and analytics for security team Axoflow has launched its Security

React to this headline:

Loading spinner

New infosec products of the week: October 24, 2025 Read More »

When AI writes code, humans clean up the mess

When AI writes code, humans clean up the mess 2025-10-24 at 10:42 By Anamarija Pogorelec AI coding tools are reshaping how software is written, tested, and secured. They promise speed, but that speed comes with a price. A new report from Aikido Security shows that most organizations now use AI to write production code, and

React to this headline:

Loading spinner

When AI writes code, humans clean up the mess Read More »

Researchers expose large-scale YouTube malware distribution network

Researchers expose large-scale YouTube malware distribution network 2025-10-23 at 17:37 By Zeljka Zorz Check Point researchers have uncovered, mapped and helped set back a stealthy, large-scale malware distribution operation on YouTube they dubbed the “YouTube Ghost Network.” The network published more than 3,000 videos across compromised or fake channels, luring viewers with game cheats, cracked

React to this headline:

Loading spinner

Researchers expose large-scale YouTube malware distribution network Read More »

Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932)

Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932) 2025-10-23 at 17:10 By Zeljka Zorz CVE-2025-61932, an “improper verification of source of a communication channel” vulnerability affecting Lanscope Endpoint Manager, has been exploited as a zero-day since April 2025, the Japan Computer Emergency Response Team Coordination Center (JPCERT/CC) warned on Wednesday. According to information received

React to this headline:

Loading spinner

Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932) Read More »

Wireshark 4.6.0 brings major updates for packet analysis and decryption

Wireshark 4.6.0 brings major updates for packet analysis and decryption 2025-10-23 at 17:10 By Anamarija Pogorelec If you’ve ever used Wireshark to dig into network traffic you know how vital even small upgrades can be. With version 4.6.0 the team behind the open-source network protocol analyzer has added a number of features that could change

React to this headline:

Loading spinner

Wireshark 4.6.0 brings major updates for packet analysis and decryption Read More »

Critical Adobe Commerce, Magento vulnerability under attack (CVE-2025-54236)

Critical Adobe Commerce, Magento vulnerability under attack (CVE-2025-54236) 2025-10-23 at 14:39 By Zeljka Zorz Attackers are trying to exploit CVE-2025-54236, a critical vulnerability affecting Adobe Commerce and Magento Open Source, Sansec researchers have warned. The company blocked over 250 exploitation attempts targeting multiple stores on Wednesday, and expects the attacks to continue at pace. About

React to this headline:

Loading spinner

Critical Adobe Commerce, Magento vulnerability under attack (CVE-2025-54236) Read More »

Faster LLM tool routing comes with new security considerations

Faster LLM tool routing comes with new security considerations 2025-10-23 at 09:23 By Sinisa Markovic Large language models depend on outside tools to perform real-world tasks, but connecting them to those tools often slows them down or causes failures. A new study from the University of Hong Kong proposes a way to fix that. The

React to this headline:

Loading spinner

Faster LLM tool routing comes with new security considerations Read More »

The next cyber crisis may start in someone else’s supply chain

The next cyber crisis may start in someone else’s supply chain 2025-10-23 at 09:23 By Anamarija Pogorelec Organizations are getting better at some aspects of risk management but remain underprepared for the threats reshaping the business landscape, according to a new Riskonnect report. The findings show a growing gap between awareness and action as technology,

React to this headline:

Loading spinner

The next cyber crisis may start in someone else’s supply chain Read More »

How Lazarus Group used fake job ads to spy on Europe’s drone and defense sector

How Lazarus Group used fake job ads to spy on Europe’s drone and defense sector 2025-10-23 at 09:23 By Sinisa Markovic ESET researchers have uncovered a fresh wave of Operation DreamJob, a long-running campaign linked to North Korea’s Lazarus Group. This latest activity targeted several European defense contractors, including firms deeply involved in drone and

React to this headline:

Loading spinner

How Lazarus Group used fake job ads to spy on Europe’s drone and defense sector Read More »

Your wearable knows your heartbeat, but who else does?

Your wearable knows your heartbeat, but who else does? 2025-10-23 at 09:23 By Sinisa Markovic Smartwatches, glucose sensors, and connected drug-monitoring devices are common in care programs. Remote monitoring helps detect changes early and supports personalized treatment and long-term condition management. They give clinicians valuable insight into patient health but also introduce new exposure points.

React to this headline:

Loading spinner

Your wearable knows your heartbeat, but who else does? Read More »

Gartner predicts the technologies set to transform 2026

Gartner predicts the technologies set to transform 2026 2025-10-23 at 07:09 By Anamarija Pogorelec Gartner has unveiled its vision for the technologies that will define 2026, spotlighting the innovations and risks that business and IT leaders can’t afford to ignore. The research firm says organizations are entering a period of change, where AI, connectivity, and

React to this headline:

Loading spinner

Gartner predicts the technologies set to transform 2026 Read More »

Attackers target retailers’ gift card systems using cloud-only techniques

Attackers target retailers’ gift card systems using cloud-only techniques 2025-10-22 at 17:12 By Zeljka Zorz A newly uncovered attack campaign mounted by suspected Morocco-based attackers has been hitting global retailers and other businesses issuing gift cards. What makes this campaign stand out is how the threat actors avoid typical malware techniques and endpoint hacking and

React to this headline:

Loading spinner

Attackers target retailers’ gift card systems using cloud-only techniques Read More »

Scroll to Top