Interview: Ian Ruffle, head of data and insight, RAC
24
Nov
2025

Interview: Ian Ruffle, head of data and insight, RAC

Ian Ruffle, head of data and insight at the RAC, says the key to exploiting data assets is twofold –…

CrowdStrike Fires Suspicious Insider Linked To Hackers
24
Nov
2025

CrowdStrike Fires Suspicious Insider Linked To Hackers

Cybersecurity firm CrowdStrike confirmed the termination of a “suspicious insider” who allegedly shared internal information with hackers. The move came…

week in security
24
Nov
2025

A week in security (November 17 – November 23)

November 21, 2025 – FoloToy’s AI teddy bear, Kumma, crossed serious lines, raising fresh concerns about how little oversight exists…

WSUS Vulnerability ShadowPad Malware
24
Nov
2025

ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access

Nov 24, 2025Ravie LakshmananMalware / Vulnerability A recently patched security flaw in Microsoft Windows Server Update Services (WSUS) has been…

Scattered Spider alleged members deny TfL charges
24
Nov
2025

Scattered Spider alleged members deny TfL charges

Scattered Spider alleged members deny TfL charges Pierluigi Paganini November 24, 2025 Two UK teens linked to Scattered Spider pleaded…

Beware of North Korean Fake Job Platform Targeting U.S. Based AI-Developers
24
Nov
2025

Beware of North Korean Fake Job Platform Targeting U.S. Based AI-Developers

A sophisticated recruitment scam linked to North Korea has emerged, targeting American artificial intelligence developers, software engineers, and cryptocurrency professionals…

The privacy tension driving the medical data shift nobody wants to talk about
24
Nov
2025

The privacy tension driving the medical data shift nobody wants to talk about

Most people assume their medical data sits in quiet storage, protected by familiar rules. That belief gives a sense of…

DeepSeek-R1 Makes Code for Prompts With Severe Security Vulnerabilities
24
Nov
2025

DeepSeek-R1 Makes Code for Prompts With Severe Security Vulnerabilities

A concerning vulnerability in DeepSeek-R1, a Chinese-developed artificial intelligence coding assistant. When the AI model encounters politically sensitive topics related…

Quantum encryption is pushing satellite hardware to its limits
24
Nov
2025

Quantum encryption is pushing satellite hardware to its limits

In this Help Net Security interview, Colonel Ludovic Monnerat, Commander Space Command, Swiss Armed Forces, discusses how securing space assets…

cnspec: Open-source, cloud-native security and policy project
24
Nov
2025

cnspec: Open-source, cloud-native security and policy project

cnspec is an open source tool that helps when you are trying to keep a sprawling setup of clouds, containers,…

What happens when vulnerability scores fall apart?
24
Nov
2025

What happens when vulnerability scores fall apart?

Security leaders depend on vulnerability data to guide decisions, but the system supplying that data is struggling. An analysis from…

Wireshark Vulnerabilities Let Attackers Crash by Injecting a Malformed Packet
24
Nov
2025

Wireshark Vulnerabilities Let Attackers Crash by Injecting a Malformed Packet

The Wireshark Foundation has rolled out a crucial security update for its widely used network protocol analyzer, addressing multiple vulnerabilities…