Microsoft Family Safety Now Blocking All Versions of Google Chrome
23
Jun
2025

Microsoft Family Safety Now Blocking All Versions of Google Chrome

In a development that has left students, parents, and educators frustrated, Microsoft’s Family Safety feature is now blocking all versions…

Clouded judgement: Resilience, risk and the rise of repatriation
23
Jun
2025

Clouded judgement: Resilience, risk and the rise of repatriation

When Amazon Web Services (AWS) launched its cloud services in 2006, it offered a utopian computing vision of agility, cost-efficiency…

Stealthy backdoor found hiding in SOHO devices running Linux
23
Jun
2025

Stealthy backdoor found hiding in SOHO devices running Linux

SecurityScorecard’s STRIKE team has uncovered a network of compromised small office and home office (SOHO) devices they’re calling LapDogs. The…

Windows Snipping Tool Now Lets Users Export Captures as GIFs
23
Jun
2025

Windows Snipping Tool Now Lets Users Export Captures as GIFs

Microsoft has rolled out a significant update to its popular Snipping Tool, introducing the ability to export screen recordings as…

Medical device cyberattacks push hospitals into crisis mode
23
Jun
2025

Medical device cyberattacks push hospitals into crisis mode

22% of healthcare organizations have experienced cyberattacks that directly impacted medical devices, according to RunSafe Security. Three-quarters of these incidents…

week in security
23
Jun
2025

A week in security (June 15 – June 21)

June 19, 2025 – Researchers have uncovered 30 exposed data sets containing over 16 billion login credentials which were likely…

Amazon EKS Vulnerabilities Exposes Sensitive AWS Credentials and Escalate Privileges
23
Jun
2025

Amazon EKS Vulnerabilities Exposes Sensitive AWS Credentials and Escalate Privileges

Summary 1.  Overprivileged containers can steal AWS credentials by targeting the 169.254.170.23:80 endpoint through packet sniffing and API spoofing attacks….

Critical Meshtastic Flaw Allows Attackers to Decrypt Private Messages
23
Jun
2025

Critical Meshtastic Flaw Allows Attackers to Decrypt Private Messages

A severe cryptographic vulnerability in the popular open-source Meshtastic project allows attackers to decrypt private messages and hijack nodes across…

Review: Redefining Hacking - Help Net Security
23
Jun
2025

Review: Redefining Hacking – Help Net Security

Redefining Hacking takes a look at how red teaming and bug bounty hunting are changing, especially now that AI is…

NCSC Warns of 'UMBRELLA STAND' Malware Attacking Fortinet FortiGate Firewalls
23
Jun
2025

NCSC Warns of ‘UMBRELLA STAND’ Malware Attacking Fortinet FortiGate Firewalls

The UK’s National Cyber Security Centre (NCSC) has issued a critical warning about a sophisticated malware campaign dubbed “UMBRELLA STAND”…

Amazon EKS Flaws Expose AWS Credentials and Enable Privilege Escalation
23
Jun
2025

Amazon EKS Flaws Expose AWS Credentials and Enable Privilege Escalation

Recent research has uncovered critical security flaws in Amazon Elastic Kubernetes Service (EKS) that could expose sensitive AWS credentials and…

How CISOs can justify security investments in financial terms
23
Jun
2025

How CISOs can justify security investments in financial terms

In this Help Net Security interview, John Verry, Managing Director at CBIZ, discusses how insurers and financial risk professionals evaluate…