Strategies to secure long-life IoT devices
20
Jun
2025

Strategies to secure long-life IoT devices

In this Help Net Security interview, Rob ter Linden, CISO at Signify, discusses priorities for CISOs working on IoT security,…

Tesla Wall Connector Hacked Through Charging Port in Just 18 Minutes
20
Jun
2025

Tesla Wall Connector Hacked Through Charging Port in Just 18 Minutes

Security researchers from Synacktiv successfully hacked the Tesla Wall Connector through its charging port in just 18 minutes, exposing critical…

CISOs flag gaps in GenAI strategy, skills, and infrastructure
20
Jun
2025

CISOs flag gaps in GenAI strategy, skills, and infrastructure

95% of C-suite leaders say that GenAI is driving a new level of innovation in their organizations, according to NTT…

AI Index 2025: What's changing and why it matters
20
Jun
2025

AI Index 2025: What’s changing and why it matters

Stanford recently released its AI Index 2025, and it’s packed with insights on how AI is changing. For CISOs, it’s…

Print Friendly, PDF & Email
20
Jun
2025

How Strategic Missteps Amplify the Financial Impact of Data Breaches

In today’s intensely interconnected digital economy, a data breach is no longer a contained technical anomaly but a profound and…

New infosec products of the week: June 20, 2025
20
Jun
2025

New infosec products of the week: June 20, 2025

Here’s a look at the most interesting products from the past week, featuring releases from BigID, Dashlane, Sumsub, and Jumio….

Angry Cat
20
Jun
2025

No, the 16 billion credentials leak is not a new data breach

News broke today of a “mother of all breaches,” sparking wide media coverage filled with warnings and fear-mongering. However, it…

20
Jun
2025

No, the 16 billion credentials leak is not a new data breach

News broke today of a “mother of all breaches,” sparking wide media coverage filled with warnings and fear-mongering. However, it…

20
Jun
2025

No, the 16 billion credentials leak is not a new data breach

News broke today of a “mother of all breaches,” sparking wide media coverage filled with warnings and fear-mongering. However, it…

Researchers discovered the largest data breach ever, exposing 16 billion login credentials
20
Jun
2025

Researchers discovered the largest data breach ever, exposing 16 billion login credentials

Researchers discovered the largest data breach ever, exposing 16 billion login credentials Pierluigi Paganini June 19, 2025 Researchers discovered the…

Android
19
Jun
2025

Godfather Android malware now uses virtualization to hijack banking apps

A new version of the Android malware “Godfather” creates isolated virtual environments on mobile devices to steal account data and transactions from…

North Korean Hackers Deploy Malware Using Weaponized Calendly and Google Meet Links
19
Jun
2025

North Korean Hackers Deploy Malware Using Weaponized Calendly and Google Meet Links

The North Korean state-sponsored threat actor group, identified as TA444 (also known as BlueNoroff, Sapphire Sleet, and others), has unleashed…