Trojanized GitHub
20
Jun
2025

200+ Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers

Cybersecurity researchers have uncovered a new campaign in which the threat actors have published more than 67 GitHub repositories that…

A ransomware attack pushed the German napkin firm Fasana into insolvency
20
Jun
2025

A ransomware attack pushed the German napkin firm Fasana into insolvency

A ransomware attack pushed the German napkin firm Fasana into insolvency Pierluigi Paganini June 20, 2025 A cyberattack pushed the…

IBM QRadar SIEM Bug Lets Attackers Run Arbitrary Commands
20
Jun
2025

IBM QRadar SIEM Bug Lets Attackers Run Arbitrary Commands

IBM has issued a critical security update for its QRadar SIEM platform after researchers uncovered multiple vulnerabilities, including a severe…

Who's guarding the AI? Even security teams are bypassing oversight
20
Jun
2025

Who’s guarding the AI? Even security teams are bypassing oversight

Even security teams, the ones responsible for protecting the business, are adding to AI-related risk. A new survey by AI…

Malicious Support Tickets Let Hackers Exploit Atlassian’s Model Context Protocol
20
Jun
2025

Malicious Support Tickets Let Hackers Exploit Atlassian’s Model Context Protocol

A new class of cyberattack is targeting organizations leveraging Atlassian’s Model Context Protocol (MCP), exposing a critical weakness in the…

Strategies to secure long-life IoT devices
20
Jun
2025

Strategies to secure long-life IoT devices

In this Help Net Security interview, Rob ter Linden, CISO at Signify, discusses priorities for CISOs working on IoT security,…

Tesla Wall Connector Hacked Through Charging Port in Just 18 Minutes
20
Jun
2025

Tesla Wall Connector Hacked Through Charging Port in Just 18 Minutes

Security researchers from Synacktiv successfully hacked the Tesla Wall Connector through its charging port in just 18 minutes, exposing critical…

CISOs flag gaps in GenAI strategy, skills, and infrastructure
20
Jun
2025

CISOs flag gaps in GenAI strategy, skills, and infrastructure

95% of C-suite leaders say that GenAI is driving a new level of innovation in their organizations, according to NTT…

AI Index 2025: What's changing and why it matters
20
Jun
2025

AI Index 2025: What’s changing and why it matters

Stanford recently released its AI Index 2025, and it’s packed with insights on how AI is changing. For CISOs, it’s…

Print Friendly, PDF & Email
20
Jun
2025

How Strategic Missteps Amplify the Financial Impact of Data Breaches

In today’s intensely interconnected digital economy, a data breach is no longer a contained technical anomaly but a profound and…

New infosec products of the week: June 20, 2025
20
Jun
2025

New infosec products of the week: June 20, 2025

Here’s a look at the most interesting products from the past week, featuring releases from BigID, Dashlane, Sumsub, and Jumio….

Angry Cat
20
Jun
2025

No, the 16 billion credentials leak is not a new data breach

News broke today of a “mother of all breaches,” sparking wide media coverage filled with warnings and fear-mongering. However, it…