The hidden risks inside open-source code
Open-source software is everywhere. It runs the browsers we use, the apps we rely on, and the infrastructure that keeps businesses connected. For many security…
Open-source software is everywhere. It runs the browsers we use, the apps we rely on, and the infrastructure that keeps businesses connected. For many security…
Sep 30, 2025Ravie LakshmananVulnerability / Linux The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting the Sudo command-line…
The US federal law that facilitates a significant portion of information sharing between the federal government and private sector is likely to expire October 1…
Apple has rolled out security updates across its operating systems to address a vulnerability in the Font Parser component that could allow malicious fonts to…
Luxury department store Harrods has become the latest victim of a significant cybersecurity incident after hackers successfully accessed personal data belonging to 430,000 customers. The prestigious London retailer…
In this Help Net Security interview, Vivien Bilquez, Global Head of Cyber Resilience at Zurich Resilience Solutions, discusses how organizations are rethinking cyber resilience. He…
Japanese beer and beverage giant Asahi Group Holdings has not been able to resume production at domestic factories a day after a cyberattack and cannot…
Cybersecurity researchers have identified a sophisticated campaign where threat actors are using malicious advertisements and search engine optimization poisoning to distribute fake Microsoft Teams installers…
The resilience of the world’s submarine cable network is under new pressure from geopolitical tensions, supply chain risks, and slow repair processes. A new report…
Optus’s CEO will need more time to turn around the embattled telecom carrier, the boss of its parent Singapore Telecommunications, who is in Australia to…
Australian consultancy DevOps1 has acquired cloud engineering firm Innablr, marking a major step in its strategy to build a scaled local alternative to the global…
Security researchers have spotted what they think is the world’s first malicious model context protocol (MCP) server, made available as open source on Microsoft owned…