The network perimeter no longer exists. Employees are as likely to log in from a coffee shop or airport lounge…
The U.S. Justice Department announced major actions against North Korean cybercrime, including five people admitting guilt and the government taking…
A sharp increase in attacks targeting a critical vulnerability in XWiki servers. Multiple threat actors are actively exploiting CVE-2025-24893 to deploy botnets…
A study by Boston Consulting Group (BCG) suggests that organisations that lead in technology development are gaining a first-mover advantage…
RondoDox expands botnet by exploiting XWiki RCE bug left unpatched since February 2025 Pierluigi Paganini November 17, 2025 RondoDox botnet…
Welcome to The researcher’s desk – a content series where the Detectify security research team conducts a technical autopsy on…
Samsung has been accused of shipping budget Galaxy A and M series smartphones with pre-installed spyware that users can’t easily…
AI is spreading faster than any major technology in history, according to a Microsoft report. More than 1.2 billion people…
November 14, 2025 – Contacted out of the blue for a virtual interview? Be cautious. Attackers are using fake interviews…
A threat actor known as “888” has purportedly dumped sensitive data stolen from electronics giant LG Electronics, raising alarms in…
In this Help Net Security interview, Sev Kelian, CISO and VP of Security at Tecsys, discusses how organizations can strengthen…
Nov 17, 2025Ravie LakshmananVulnerability / Mobile Security Google has disclosed that the company’s continued adoption of the Rust programming language…