News

Product showcase: Enzoic for Active Directory

Product showcase: Enzoic for Active Directory 2025-07-16 at 08:19 By Help Net Security Enzoic for Active Directory is an easy-to-install plugin that integrates with Microsoft Active Directory (AD) to set, monitor, and remediate unsafe passwords and credentials. In essence, it serves as an always-on sentinel for AD, preventing users from choosing compromised or weak passwords […]

React to this headline:

Loading spinner

Product showcase: Enzoic for Active Directory Read More »

Experts unpack the biggest cybersecurity surprises of 2025

Experts unpack the biggest cybersecurity surprises of 2025 2025-07-16 at 08:19 By Mirko Zorz 2025 has been a busy year for cybersecurity. From unexpected attacks to new tactics by threat groups, a lot has caught experts off guard. We asked cybersecurity leaders to share the biggest surprises they’ve seen so far this year and what

React to this headline:

Loading spinner

Experts unpack the biggest cybersecurity surprises of 2025 Read More »

Real-world numbers for estimating security audit costs

Real-world numbers for estimating security audit costs 2025-07-16 at 08:10 By Help Net Security At the end of Star Wars: A New Hope, Luke Skywalker races through the Death Star trench, hearing the ghostly voice of Obi-Wan Kenobi telling him to trust him. Luke places blind trust in an intangible energy that surrounds him, he

React to this headline:

Loading spinner

Real-world numbers for estimating security audit costs Read More »

Falco: Open-source cloud-native runtime security tool for Linux

Falco: Open-source cloud-native runtime security tool for Linux 2025-07-16 at 07:46 By Help Net Security Falco is an open-source runtime security tool for Linux systems, built for cloud-native environments. It monitors the system in real time to spot unusual activity and possible security threats. Falco is a graduated project from the Cloud Native Computing Foundation

React to this headline:

Loading spinner

Falco: Open-source cloud-native runtime security tool for Linux Read More »

Most cybersecurity risk comes from just 10% of employees

Most cybersecurity risk comes from just 10% of employees 2025-07-16 at 07:46 By Anamarija Pogorelec A new report from Living Security and the Cyentia Institute sheds light on the real human element behind cybersecurity threats, and it’s not what most organizations expect. The Risky Business: Who Protects & Who Puts You at Risk report analyzes

React to this headline:

Loading spinner

Most cybersecurity risk comes from just 10% of employees Read More »

Vulnerable firmware for Gigabyte motherboards could allow bootkit installation

Vulnerable firmware for Gigabyte motherboards could allow bootkit installation 2025-07-15 at 16:19 By Zeljka Zorz UEFI firmware running on 100+ Gigabyte motherboard models is affected by memory corruption vulnerabilities that may allow attackers to install persistent and difficult-to-detect bootkits (i.e., malware designed to infect the computer’s boot process). “While AMI (the original firmware supplier) has

React to this headline:

Loading spinner

Vulnerable firmware for Gigabyte motherboards could allow bootkit installation Read More »

Trustwave’s David Broggy Honored for the Third Time with Microsoft’s Most Valuable Professional Award

Trustwave’s David Broggy Honored for the Third Time with Microsoft’s Most Valuable Professional Award 2025-07-15 at 16:04 By For the third consecutive year, Microsoft has awarded Trustwave’s David Broggy, Senior Solutions Architect, Implementation Services, its Most Valuable Professional (MVP) Award. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Trustwave’s David Broggy Honored for the Third Time with Microsoft’s Most Valuable Professional Award Read More »

AsyncRAT evolves as ESET tracks its most popular malware forks

AsyncRAT evolves as ESET tracks its most popular malware forks 2025-07-15 at 12:50 By Sinisa Markovic AsyncRAT is an open-source remote access trojan that first appeared on GitHub in 2019. It includes a range of typical RAT capabilities, such as keylogging, screen capture, credential theft, and more. Its simplicity and open-source design have made it

React to this headline:

Loading spinner

AsyncRAT evolves as ESET tracks its most popular malware forks Read More »

Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech

Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech 2025-07-15 at 09:00 By Mirko Zorz For decades, manufacturers and security professionals have been playing a high-stakes game of cat and mouse with counterfeiters. From holograms and QR codes to RFID tags and serial numbers, the industry’s toolkit has evolved, but so have the

React to this headline:

Loading spinner

Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech Read More »

Securing vehicles as they become platforms for code and data

Securing vehicles as they become platforms for code and data 2025-07-15 at 08:31 By Mirko Zorz In this Help Net Security interview, Robert Knoblauch, CISO at Element Fleet Management, discusses how the rise of connected vehicles and digital operations is reshaping fleet management cybersecurity. He points to growing risks like API breaches, tampering with onboard

React to this headline:

Loading spinner

Securing vehicles as they become platforms for code and data Read More »

How service providers can turn cybersecurity into a scalable MRR engine

How service providers can turn cybersecurity into a scalable MRR engine 2025-07-15 at 08:04 By Help Net Security A growing number of MSPs, MSSPs, and consultancies are moving beyond one-and-done engagements and transforming from tactical vendors into strategic advisors. They’re shifting toward recurring cybersecurity programs that not only improve client outcomes but also generate compounding

React to this headline:

Loading spinner

How service providers can turn cybersecurity into a scalable MRR engine Read More »

Stop settling for check-the-box cybersecurity policies

Stop settling for check-the-box cybersecurity policies 2025-07-15 at 07:43 By Sinisa Markovic After every breach, people ask: How did this happen if there were cybersecurity policies in place? The truth is, just having them doesn’t stop attacks. They only work if people know them and follow them when it matters. That’s where things often break

React to this headline:

Loading spinner

Stop settling for check-the-box cybersecurity policies Read More »

Cybersecurity jobs available right now: July 15, 2025

Cybersecurity jobs available right now: July 15, 2025 2025-07-15 at 07:10 By Anamarija Pogorelec Application Penetration Tester Tata Consultancy Services | Ireland | Hybrid – View job details As an Application Penetration Tester, you will perform in-depth manual testing of web applications and APIs. You’ll work with clients to define scope and understand application functionality.

React to this headline:

Loading spinner

Cybersecurity jobs available right now: July 15, 2025 Read More »

Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)

Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257) 2025-07-14 at 16:34 By Zeljka Zorz With two proof-of-concept (PoC) exploits made public late last week, CVE-2025-25257 – a critical SQL command injection vulnerability in Fortinet’s FortiWeb web application firewall – is expected to be leveraged by attackers soon. About CVE-2025-25257 CVE-2025-25257 is found

React to this headline:

Loading spinner

Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257) Read More »

Trustwave Launches Managed Phishing for Microsoft Service

Trustwave Launches Managed Phishing for Microsoft Service 2025-07-14 at 16:02 By Phishing remains the number one method attackers use to gain initial access to organizations. That makes your workforce the front line of defense and your ability to identify, neutralize, and respond to phishing attempts is more critical than ever. This article is an excerpt

React to this headline:

Loading spinner

Trustwave Launches Managed Phishing for Microsoft Service Read More »

FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare

FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare 2025-07-14 at 09:32 By Mirko Zorz In this Help Net Security interview, Gail Hodges, Executive Director at the OpenID Foundation, discusses how the Foundation ensures global consistency in FAPI 2.0 implementations and helps different industries, including healthcare, adopt secure and interoperable identity

React to this headline:

Loading spinner

FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare Read More »

pqcscan: Open-source post-quantum cryptography scanner

pqcscan: Open-source post-quantum cryptography scanner 2025-07-14 at 09:04 By Mirko Zorz pqcscan is an open-source tool that lets users scan SSH and TLS servers to see which Post-Quantum Cryptography (PQC) algorithms they claim to support. It saves the results in JSON files. You can turn one or more of these files into an HTML report

React to this headline:

Loading spinner

pqcscan: Open-source post-quantum cryptography scanner Read More »

Bitdefender PHASR: Proactive hardening demo overview

Bitdefender PHASR: Proactive hardening demo overview 2025-07-14 at 08:35 By Help Net Security Discover how Bitdefender PHASR enables organizations to identify and remediate security misconfigurations before attackers can exploit them. This demo walks through PHASR’s proactive hardening capabilities, showing how it transforms visibility into actionable protection. The post Bitdefender PHASR: Proactive hardening demo overview appeared

React to this headline:

Loading spinner

Bitdefender PHASR: Proactive hardening demo overview Read More »

Why your Microsoft 365 setup might be more vulnerable than you think

Why your Microsoft 365 setup might be more vulnerable than you think 2025-07-14 at 08:15 By Help Net Security 60% of organizations rate their Microsoft 365 security as “established” or “advanced”, according to CoreView. Yet, 60% of those same organizations have experienced account compromise attacks. The Microsoft 365 attack surface is wide and unpredictable. Risks

React to this headline:

Loading spinner

Why your Microsoft 365 setup might be more vulnerable than you think Read More »

Ransomware drops, but don’t relax yet

Ransomware drops, but don’t relax yet 2025-07-14 at 07:44 By Help Net Security WatchGuard has released its latest Internet Security Report, covering malware, network, and endpoint threats spotted by its Threat Lab in the first quarter of 2025. The report shows a 171% jump in unique malware detections compared to the previous quarter, the highest

React to this headline:

Loading spinner

Ransomware drops, but don’t relax yet Read More »

Scroll to Top