CISA Adds Actively Exploited Ivanti EPMM Zero-Day to KEV Catalog
20
May
2025

CISA Adds Actively Exploited Ivanti EPMM Zero-Day to KEV Catalog

Cybersecurity and Infrastructure Security Agency (CISA) has added two critical zero-day vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM) to its…

Jane Devry
20
May
2025

Honeypots become a strategic layer in cyber defence

J2 Software has introduced ‘Honeypot as a Service’, a plug-and-play solution designed to deceive attackers, gather critical threat intelligence, and…

Cybersecurity jobs available right now: May 20, 2025
20
May
2025

Cybersecurity jobs available right now: May 20, 2025

CISO Vault Cloud | Australia | Hybrid – View job details As a CISO, you will lead company’s cloud security…

Naveen Goud
20
May
2025

How a Turing Test Can Curb AI-Based Cyber Attacks

In recent years, artificial intelligence (AI) has emerged as a powerful tool, revolutionizing industries from healthcare to finance. However, as…

Closing security gaps in multi-cloud and SaaS environments
20
May
2025

Closing security gaps in multi-cloud and SaaS environments

In this Help Net Security interview, Kunal Modasiya, SVP, Product Management, GTM, and Growth at Qualys, discusses recent Qualys research…

Legal Aid Data Breach
20
May
2025

Legal Aid Data Breach Hits Millions, MoJ Warns

The UK Ministry of Justice (MoJ) has confirmed that hackers have accessed a “large amount of information” from the Legal…

Why legal must lead on AI governance before it's too late
20
May
2025

Why legal must lead on AI governance before it’s too late

In this Help Net Security interview, Brooke Johnson, Chief Legal Counsel and SVP of HR and Security, Ivanti, explores the…

AI voice hijacking: How well can you trust your ears?
20
May
2025

AI voice hijacking: How well can you trust your ears?

How sure are you that you can recognize an AI-cloned voice? If you think you’re completely certain, you might be…

Personal data taken in UK legal aid cyber attack
20
May
2025

Personal data taken in UK legal aid cyber attack

Britain’s Legal Aid Agency reported a cyber attack which it said had resulted in a group accessing and downloading a…

Cyber criminals turn to Australian SMEs as ransomware threat escalates
20
May
2025

Cyber criminals turn to Australian SMEs as ransomware threat escalates

As attackers turn their sights beyond large enterprises, Australian SMEs are paying the price for being underprepared to face growing…

ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats
20
May
2025

ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats

A critical security vulnerability in ChatGPT has been discovered that allows attackers to embed malicious SVG (Scalable Vector Graphics) and…

Jane Devry
20
May
2025

Recent Evolution of Browser-based Cyber Threats, and What to Expect Next

In 2024, browser security faced some of the most advanced cyber threats to-date. As enterprises continue to transition to and…