Bitpixie Vulnerability Proof of Concept Unveiled
15
May
2025

Bitpixie Vulnerability Proof of Concept Unveiled

Security researchers have demonstrated a non-invasive method to bypass Microsoft BitLocker encryption on Windows devices in just five minutes without…

Nova Scotia Power Data Breach
15
May
2025

Nova Scotia Power Data Breach Puts Thousands At Risk

Nova Scotia’s largest electric utility, Nova Scotia Power, has confirmed that customer information was stolen in a recent cyberattack that…

cybersecurity experts in Japan
15
May
2025

Japan To Train 50,000 Cybersecurity Experts By 2030

The Japanese government has set an ambitious target to increase the number of cybersecurity experts to 50,000 by 2030. This initiative…

BitLocker Encryption Bypassed in Minutes Using Bitpixie Vulnerability
15
May
2025

BitLocker Encryption Bypassed in Minutes Using Bitpixie Vulnerability

A critical vulnerability in Microsoft’s BitLocker full disk encryption, demonstrating that it can be bypassed in under five minutes using…

Google Chrome Zero-Day Vulnerability (CVE-2025-4664) Actively Exploited in The Wild
15
May
2025

Google Chrome Zero-Day Vulnerability (CVE-2025-4664) Actively Exploited in The Wild

Google has rolled out a fresh Stable Channel update for the Chrome browser across desktop platforms, including Windows, Mac, and…

15
May
2025

How 300,000+ hard drives performed in the real world

Cloud storage company Backblaze has released its Q1 2025 hard drive reliability report, which provides insights into the performance and…

New Chrome Vulnerability
15
May
2025

New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy

May 15, 2025Ravie LakshmananBrowser Security / Web Security Google on Wednesday released updates to address four security issues in its…

Developer Leaks API Key for Private Tesla, SpaceX LLMs — API Security
15
May
2025

Developer Leaks API Key for Private Tesla, SpaceX LLMs — API Security

In AI, as with so many advancing technologies, security often lags innovation. The xAI incident, during which a sensitive API…

New Weaponized PyPI Package Attacking Developers to Steal Source Code
15
May
2025

New Weaponized PyPI Package Attacking Developers to Steal Source Code

A newly discovered malicious Python package, solana-token, has been weaponized to steal source code and sensitive secrets from developers working…

Naveen Goud
15
May
2025

Google warns of US retail cyber attacks and M & S insurance payout to cost £100m

Google Issues Warning to U.S. Retailers About the Growing Threat of Scattered Spider Cyberattacks Google’s Threat Intelligence team has issued…

15
May
2025

Building cybersecurity culture in science-driven organizations

In this Help Net Security interview, Anne Sofie Roed Rasmussen, CISO at Novonesis, discusses how a science-driven organization approaches cybersecurity,…

15
May
2025

New blockchain security standards target safer ecosystems

The Blockchain Security Standards Council (BSSC) launched its first four security standards, marking a significant milestone in the journey towards…