Stealth Phishing Campaign
27
May
2025

FBI Alerts Law Firms to Luna Moth’s Stealth Phishing Campaign

May 27, 2025Ravie LakshmananData Breach / Social Engineering The U.S. Federal Bureau of Investigation (FBI) has warned of social engineering…

UK eVisa: Ethical or harmful?
27
May
2025

UK eVisa: Ethical or harmful?

Thank you for joining! Access your Pro+ Content below. 27 May 2025 UK eVisa: Ethical or harmful? Share this item…

Arm Mali GPU Vulnerability Enables Bypass of MTE and Arbitrary Kernel Code Execution
27
May
2025

Arm Mali GPU Vulnerability Enables Bypass of MTE and Arbitrary Kernel Code Execution

A critical vulnerability, identified as CVE-2025-0072, has been discovered in the Arm Mali GPU driver, posing a significant threat to…

Nova Scotia Power confirms it was hit by ransomware
27
May
2025

Nova Scotia Power confirms it was hit by ransomware

Nova Scotia Power confirms it was hit by ransomware attack but hasn’t paid the ransom Pierluigi Paganini May 27, 2025…

Hackers Exploit HTTP/2 Flaw to Launch Arbitrary Cross-Site Scripting Attacks
27
May
2025

Hackers Exploit HTTP/2 Flaw to Launch Arbitrary Cross-Site Scripting Attacks

A groundbreaking study from Tsinghua University and Zhongguancun Laboratory has uncovered critical vulnerabilities in modern web infrastructure, revealing that HTTP/2…

Weaponized Word Documents
27
May
2025

Russia-Linked Hackers Target Tajikistan Government with Weaponized Word Documents

May 27, 2025Ravie LakshmananMalware / Threat Intelligence The Russia-aligned threat actor known as TAG-110 has been observed conducting a spear-phishing…

Crooks stole +$200 million from crypto exchange Cetus Protocol
27
May
2025

Crooks stole +$200 million from crypto exchange Cetus Protocol

Crooks stole over $200 million from crypto exchange Cetus Protocol Pierluigi Paganini May 27, 2025 Cetus Protocol reported a $223…

How Google Meet Pages Are Exploited to Deliver PowerShell Malware
27
May
2025

How Google Meet Pages Are Exploited to Deliver PowerShell Malware

A new wave of cyberattacks exploits user trust in Google Meet by deploying meticulously crafted fake meeting pages that trick…

4.5% of breaches now extend to fourth parties
27
May
2025

4.5% of breaches now extend to fourth parties

Security teams can no longer afford to treat third-party security as a compliance checkbox, according to SecurityScorecard. Traditional vendor risk…

How AI agents reshape industrial automation and risk management
27
May
2025

How AI agents reshape industrial automation and risk management

In this Help Net Security interview, Michael Metzler, Vice President Horizontal Management Cybersecurity for Digital Industries at Siemens, discusses the…

How well do you know your remote IT worker?
27
May
2025

How well do you know your remote IT worker?

Is the remote IT worker you recently hired really who he says he is? Fake IT workers are slipping into…

Cybersecurity jobs available right now: May 27, 2025
27
May
2025

Cybersecurity jobs available right now: May 27, 2025

Application Security Engineer, SDO AppSec Amazon | EMEA | Hybrid – View job details As an Application Security Engineer, SDO…