Category: HelpnetSecurity

ForensicScope Regula 4125 detects counterfeit documents
28
Jan
2025

ForensicScope Regula 4125 detects counterfeit documents

Regula has launched the portable and autonomous ForensicScope Regula 4125. The new device enables ID verification in any place and…

Europeans targeted with new Tor-using backdoor and infostealers
28
Jan
2025

Europeans targeted with new Tor-using backdoor and infostealers

A financially motivated threat actor has been targeting German and Polish-speaking users with info-stealing malware and TorNet, a previously undocumented…

Hiya AI Phone blocks spam and irrelevant calls
28
Jan
2025

Hiya AI Phone blocks spam and irrelevant calls

Hiya has introduced Hiya AI Phone, an AI call assistant mobile app. Designed for busy professionals, Hiya AI Phone acts…

Apple zero-day vulnerability exploited to target iPhone users (CVE-2025-24085)
28
Jan
2025

Apple zero-day vulnerability exploited to target iPhone users (CVE-2025-24085)

Apple has shipped a fix for a zero-day vulnerability (CVE-2025-24085) that is being leveraged by attackers against iPhone users. About…

Compliance Scorecard Version 7 simplifies compliance management for MSPs
28
Jan
2025

Compliance Scorecard Version 7 simplifies compliance management for MSPs

Compliance Scorecard released Compliance Scorecard Version 7. This latest release is designed to seamlessly integrate compliance into cybersecurity offerings, delivering…

Cybersecurity jobs available right now: January 28, 2025
28
Jan
2025

Cybersecurity jobs available right now: January 28, 2025

Application Security Engineer Bumble | United Kingdom | Hybrid – View job details As an Application Security Engineer, you will…

BloodyAD: Open-source Active Directory privilege escalation framework
28
Jan
2025

BloodyAD: Open-source Active Directory privilege escalation framework

BloodyAD is an open-source Active Directory privilege escalation framework that uses specialized LDAP calls to interact with domain controllers. It…

74% of CISOs are increasing crisis simulation budgets
28
Jan
2025

74% of CISOs are increasing crisis simulation budgets

In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, 23andMe, Transport for London, and Cencora, CISOs are reassessing…

5,000+ SonicWall firewalls still open to attack (CVE-2024-53704)
27
Jan
2025

5,000+ SonicWall firewalls still open to attack (CVE-2024-53704)

5,000+ SonicWall firewalls are still vulnerable to attack via a high-severity vulnerability (CVE-2024-53704) that, according to SonicWall, should be considered…

AI security posture management will be needed before agentic AI takes hold
27
Jan
2025

AI security posture management will be needed before agentic AI takes hold

As I’m currently knee deep in testing agentic AI in all its forms, as well as new iterations of current…

Don't let these open-source cybersecurity tools slip under your radar
27
Jan
2025

Don’t let these open-source cybersecurity tools slip under your radar

This article showcases free, open-source cybersecurity tools that help you identify and address vulnerabilities, detect intrusion, protect websites from cyber…

How to use Apple's App Privacy Report to monitor data tracking
27
Jan
2025

How to use Apple’s App Privacy Report to monitor data tracking

The App Privacy Report, which Apple introduced in iOS 15.2, allows users to monitor how apps access data and interact…