CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
A high-severity Chrome vulnerability (CVE-2025-4664) that Google has fixed on Wednesday is being leveraged by attackers, CISA has confirmed by...
Read more →A high-severity Chrome vulnerability (CVE-2025-4664) that Google has fixed on Wednesday is being leveraged by attackers, CISA has confirmed by...
Read more →Here’s a look at the most interesting products from the past week, featuring releases from Hunted Labs, McAfee, Obsidian Security,...
Read more →AI is transforming the phishing threat landscape at a pace many security teams are struggling to match, according to Cofense....
Read more →In this Help Net Security interview, Camellia Chan, CEO at X-PHY, discusses the dangers of deepfakes in real-world incidents, including...
Read more →The Linux Foundation, in collaboration with OpenSSF and Linux Foundation Education, has released the Cybersecurity Skills Framework, a global reference...
Read more →Stressful work environments don’t just erode morale, they can quietly undermine cybersecurity. When employees feel overworked, unsupported, or mistreated, their...
Read more →Cryptocurrency exchange platform Coinbase has suffered a breach, which resulted in attackers acquiring customers’ data that can help them mount...
Read more →Companies running Samsung MagicINFO, a platform for managing content on Samsung commercial digital displays, should upgrade to the latest available...
Read more →PentestPad announced a major rollout of new features to its platform, built to transform how modern security teams deliver penetration...
Read more →ESET researchers have uncovered RoundPress, a Russia-aligned espionage operation targeting webmail servers via XSS vulnerabilities. Behind it is most likely...
Read more →Cloud storage company Backblaze has released its Q1 2025 hard drive reliability report, which provides insights into the performance and...
Read more →In this Help Net Security interview, Anne Sofie Roed Rasmussen, CISO at Novonesis, discusses how a science-driven organization approaches cybersecurity,...
Read more →