Photos: RSAC 2025, part 2
01
May
2025

Photos: RSAC 2025, part 2

RSAC 2025 Conference is taking place at the Moscone Center in San Francisco. Help Net Security is on-site, and this…

Cybercriminals Deceive Tenants into Redirecting Rent Payments to Fraudulent Accounts
01
May
2025

Cybercriminals Deceive Tenants into Redirecting Rent Payments to Fraudulent Accounts

In a sophisticated business email compromise (BEC) scheme, cybercriminals are targeting tenants with fraudulent requests to redirect rent payments to…

Print Friendly, PDF & Email
01
May
2025

DORA compliance – Why financial firms can’t afford to fall behind

The financial sector is under increasing pressure to strengthen its defences against cyber threats. With digital transformation accelerating, financial institutions…

Footprint in the sand
01
May
2025

What privacy? Perplexity wants your data, builds browser to track you and serve ads

AI search service Perplexity AI doesn’t just want you using its app—it wants to take over your web browsing experience…

New WordPress Malware as Anti-Malware Plugin Take Full Control of Website
01
May
2025

New WordPress Malware as Anti-Malware Plugin Take Full Control of Website

A sophisticated malware variant masquerading as a legitimate WordPress security plugin has been identified, capable of providing attackers with persistent…

Quantum Computing and Cybersecurity - What CISOs Need to Know Now
01
May
2025

Quantum Computing and Cybersecurity – What CISOs Need to Know Now

As quantum computing transitions from theoretical research to practical application, Chief Information Security Officers (CISOs) face an unprecedented challenge to…

Why telecoms need a proactive AI defense
01
May
2025

Why telecoms need a proactive AI defense

Telecommunications are the lifeblood of the modern world, connecting billions of people and devices. This makes them a prime target for…

patched Apple
01
May
2025

Apple AirPlay SDK devices at risk of takeover—make sure you update

Researchers found a set of vulnerabilities in Apple’s AirPlay SDK that put billions of users at risk of their devices…

Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign
01
May
2025

Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign

May 01, 2025Ravie LakshmananArtificial Intelligence / Disinformation Artificial intelligence (AI) company Anthropic has revealed that unknown threat actors leveraged its…

Microsoft commits to European datacentre footprint growth despite ‘geopolitical volatility’
01
May
2025

Microsoft commits to European datacentre footprint growth despite ‘geopolitical volatility’

Microsoft is preparing to increase its European datacentre capacity by 40% over the next two years and will appoint a…

Supply Chain Cybersecurity - CISO Risk Management Guide
01
May
2025

Supply Chain Cybersecurity – CISO Risk Management Guide

In today’s hyper-connected business environment, supply chains are no longer just about the physical movement of goods they are digital…

Tesla Model 3 VCSEC Vulnerability Lets Hackers Run Arbitrary Code
01
May
2025

Tesla Model 3 VCSEC Vulnerability Lets Hackers Run Arbitrary Code

A high security flaw in Tesla’s Model 3 vehicles, disclosed at the 2025 Pwn2Own hacking competition, allows attackers to execute…