Don’t panic over CISA’s KEV list, use it smarter
In this Help Net Security video, Tod Beardsley, VP of Security Research at runZero, explains what CISA’s Known Exploited Vulnerabilities (KEV) Catalog is and how…
In this Help Net Security video, Tod Beardsley, VP of Security Research at runZero, explains what CISA’s Known Exploited Vulnerabilities (KEV) Catalog is and how…
ShinyHunters, a well-known data extortion group, claims to have stolen more than 600,000 Canada Goose customer records containing personal and payment-related data. Canada Goose told…
Between June and December 2025, a state-sponsored threat group known as Lotus Blossom quietly hijacked the official hosting infrastructure used to deliver Notepad++ updates, turning…
A growing number of homelab builders and small server operators are testing an open source operating system that combines basic server management, storage control, and…
Chrome 0-Day Vulnerability Exploited Google has urgently patched a high-severity zero-day vulnerability in Chrome, confirming active exploitation in the wild. Tracked as CVE-2026-2441, the flaw…
Threat actors are now abusing DNS queries as part of ClickFix social engineering attacks to deliver malware, making this the first known use of DNS…
All the labs are using a combination of pre-training and RL to create better “general” models. Which means they’re not just good at one thing…
Netskope Threat Labs has identified a new phishing campaign using fake video conference invitations to deliver remote access tools into corporate environments. According to research,…
BeyondTrust has appointed Frank Cesarini as Partner Manager for Australia and New Zealand, expanding its regional channel leadership as demand for identity security services continues…
Microsoft says it has resolved a Windows 11 bug that caused some commercial systems to fail to boot with an “UNMOUNTABLE_BOOT_VOLUME” error after installing recent…
The Pentagon is considering ending its relationship with artificial intelligence company Anthropic over its insistence on keeping some restrictions on how the U.S. military uses…
Woolworths has called time on having a single executive run both physical and information security, following the departure of Pieter van der Merwe at the…