Nov 26, 2025Ravie LakshmananMalware / Cyber Espionage The threat actors behind a malware family known as RomCom targeted a U.S.-based…
Security researchers at Cato CTRL have discovered a new indirect prompt injection technique called HashJack, which weaponises legitimate websites to manipulate…
Phishing sites keep rising, and security teams are searching for ways to sort suspicious pages at speed. A recent study…
The Tor Project has announced a significant cryptographic overhaul, retiring its legacy relay encryption algorithm after decades of service and…
In this Help Net Security interview, Marina Marceta, CISO at Heineken, discusses what it takes for CISOs to be seen…
A significant issue has been disclosed that affects multiple versions of the identity and access management platform. The flaw stems…
News Corp Australia has named IAG’s Nandor Locher as its next chief digital and technology officer (CDTO), starting in March…
Microsoft has announced a significant update to the Teams Desktop Client for Windows that aims to enhance performance and reduce…
Water Gamayun, a Russia‑aligned advanced persistent threat (APT) group, has launched a new multi‑stage intrusion campaign that weaponizes the recently…
Security teams are pushing large language models into products faster than they can test them, which makes any new red…
The Account Takeover fraud threat is accelerating across the United States, prompting the Federal Bureau of Investigation (FBI) to issue…
CBA has poached a data and analytics executive from Lloyds Banking Group in the UK to become its first chief…