CISA released Thorium platform to support malware and forensic analysis
01
Aug
2025

CISA released Thorium platform to support malware and forensic analysis

CISA released Thorium platform to support malware and forensic analysis Pierluigi Paganini August 01, 2025 CISA releases Thorium, an open-source…

Solving the challenges of a bug bounty program manager (BBPM). Strategic execution for security leaders.
01
Aug
2025

Solving the challenges of a bug bounty program manager (BBPM). Strategic execution for security leaders.

As more organizations lean on third-party platforms, cloud infrastructure, and remote development teams, the attack surface grows, often faster than…

AI Engine Plugin Flaw Exposes 100K Sites To RCE Risk
01
Aug
2025

AI Engine Plugin Flaw Exposes 100K Sites To RCE Risk

A security flaw affecting over 100,000 WordPress websites has been discovered in the AI Engine plugin, specifically impacting versions 2.9.3…

ChatGPT Conversations are Being Indexed by Search Engines!
01
Aug
2025

ChatGPT Conversations are Being Indexed by Search Engines!

ChatGPT shared conversations are being indexed by major search engines, effectively turning private exchanges into publicly discoverable content accessible to…

Open-Source Malware and Forensics Tool Now Public
01
Aug
2025

Open-Source Malware and Forensics Tool Now Public

The Cybersecurity and Infrastructure Security Agency (CISA) has made a significant contribution to the cybersecurity community by publicly releasing Thorium,…

Smart steps to keep your AI future-ready
01
Aug
2025

Smart steps to keep your AI future-ready

In this Help Net Security interview, Rohan Sen, Principal, Cyber, Data, and Tech Risk, PwC US, discusses how organizations can…

Google's Project Zero to make faster vulnerability announcements
01
Aug
2025

Google’s Project Zero to make faster vulnerability announcements

Google’s elite bug hunters in the Project Zero team will from now on publicly share if they have discovered vulnerabilities…

Hackers Weaponizing Free Trials of EDR to Disable Existing EDR Protections
01
Aug
2025

Hackers Weaponizing Free Trials of EDR to Disable Existing EDR Protections

A sophisticated attack technique was uncovered where cybercriminals exploit free trials of Endpoint Detection and Response (EDR) software to disable…

Hackers Abuse EDR Free Trials to Bypass Endpoint Protection
01
Aug
2025

Hackers Abuse EDR Free Trials to Bypass Endpoint Protection

Cybersecurity researchers have uncovered a concerning new attack vector where threat actors are exploiting free trials of endpoint detection and…

It's time to sound the alarm on water sector cybersecurity
01
Aug
2025

It’s time to sound the alarm on water sector cybersecurity

A cyberattack on a water facility can put entire communities and businesses at risk. Even a short disruption in clean…

Microsoft Upgrades .NET Bounty Program, Offers Rewards Up to $40,000
01
Aug
2025

Microsoft Upgrades .NET Bounty Program, Offers Rewards Up to $40,000

Microsoft has announced significant enhancements to its .NET Bounty Program, introducing expanded coverage, streamlined award structures, and substantially increased financial…

Review: CISA Certified Information Systems Auditor Practice Tests
01
Aug
2025

Review: CISA Certified Information Systems Auditor Practice Tests

CISA Certified Information Systems Auditor Practice Tests offers practical, domain-by-domain prep for the CISA exam, with hundreds of questions covering…