June Patch Tuesday brings a lighter load for defenders
13
Jun
2025

AI Summit London: Managing legacy IT and the pace of AI development

Panel members on the AI as a Competitive Advantage session held at the AI Summit in London this week discussed…

Trend Micro fixes critical bugs in Apex Central and TMEE PolicyServer
13
Jun
2025

Trend Micro fixes critical bugs in Apex Central and TMEE PolicyServer

Trend Micro fixes critical bugs in Apex Central and TMEE PolicyServer Pierluigi Paganini June 13, 2025 Trend Micro fixed multiple…

Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware
13
Jun
2025

Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware

The Fog ransomware group has evolved beyond conventional attack methods, deploying an unprecedented arsenal of legitimate pentesting tools in a…

Major Outage Hits Google Cloud and Linked Cloudflare Services, Thousands Affected
13
Jun
2025

Major Outage Hits Google Cloud and Linked Cloudflare Services, Thousands Affected

On June 12, 2025, concurrent infrastructure failures at Cloudflare and Google caused widespread service disruptions, highlighting vulnerabilities in modern cloud…

New infosec products of the week: June 13, 2025
13
Jun
2025

New infosec products of the week: June 13, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Contrast Security, Cymulate, Lemony, SpecterOps,…

PoC Exploit Released for Critical WebDAV 0-Day RCE Vulnerability Exploited by APT Hackers
13
Jun
2025

PoC Exploit Released for Critical WebDAV 0-Day RCE Vulnerability Exploited by APT Hackers

A critical zero-day vulnerability in WebDAV implementations that enables remote code execution, with proof-of-concept exploit code now publicly available on…

What CISOs need to know about agentic AI
13
Jun
2025

What CISOs need to know about agentic AI

GenAI has been the star of the show lately. Tools like ChatGPT impressed everyone with how well they can summarize,…

Unpacking the security complexity of no-code development platforms
13
Jun
2025

Unpacking the security complexity of no-code development platforms

In this Help Net Security interview, Amichai Shulman, CTO at Nokod Security, discusses how the abstraction layer in no-code environments…

Australian Signals Directorate Warns of Cyber Impersonators
13
Jun
2025

Australian Signals Directorate Warns of Cyber Impersonators

The Australian Signals Directorate (ASD) says it is aware of cybercriminals claiming to be them through emails and phone calls,…

Threat Actors Compromise 270+ Legitimate Websites With Malicious JavaScript Using JSFireTruck Obfuscation
13
Jun
2025

Threat Actors Compromise 270+ Legitimate Websites With Malicious JavaScript Using JSFireTruck Obfuscation

Cybersecurity researchers have uncovered a sophisticated malware campaign that leveraged an advanced JavaScript obfuscation technique to compromise hundreds of legitimate…

Security flaws in government apps go unpatched for years
13
Jun
2025

Security flaws in government apps go unpatched for years

78% of public sector organizations are operating with significant security debt, flaws left unaddressed for more than a year, according…

Schneider Electric: Your One-Stop Shop for Comprehensive AI Solutions
13
Jun
2025

Schneider Electric: Your One-Stop Shop for Comprehensive AI Solutions

In today’s rapidly evolving technological landscape, businesses need more than just products; they need comprehensive solutions that foster agility, security…