Passwords alone are not enough
04
Nov
2025

Passwords alone are not enough

Never rely on just a password, however strong it may be. Multi-factor authentication is essential for anyone who wants to…

Using the OpenAI Assistants API for Covert C2 Communication
04
Nov
2025

Using the OpenAI Assistants API for Covert C2 Communication

Microsoft’s Detection and Response Team has exposed a sophisticated backdoor malware that exploits the OpenAI Assistants API as an unconventional…

Deepfakes, fraud, and the fight for trust online
04
Nov
2025

Deepfakes, fraud, and the fight for trust online

In this Help Net Security video, Michael Engle, Chief Strategy Officer at 1Kosmos, explains how deepfakes are changing online identity…

How Uber seems to know where you are – even with restricted location permissions
04
Nov
2025

How Uber seems to know where you are – even with restricted location permissions

Is the ride-hailing app secretly tracking you? Not really, but this iOS feature may make it feel that way. 09…

Hackers Actively Scanning for TCP Port 8530/8531 Linked to WSUS Vulnerability CVE-2025-59287
04
Nov
2025

Hackers Actively Scanning for TCP Port 8530/8531 Linked to WSUS Vulnerability CVE-2025-59287

Cybersecurity researchers and firewall monitoring services have detected a dramatic surge in reconnaissance activity targeting Windows Server Update Services (WSUS)…

Cybercriminals Exploit RMM Tools to Target Trucking Firms and Hijack Freight
04
Nov
2025

Cybercriminals Exploit RMM Tools to Target Trucking Firms and Hijack Freight

Cybercriminals are orchestrating sophisticated attacks against trucking and freight companies in elaborate schemes designed to steal cargo shipments worth millions….

Financial services can't shake security debt
04
Nov
2025

Financial services can’t shake security debt

In financial services, application security risk is becoming a long game. Fewer flaws appear in new code, but old ones…

How chatbots can help spread scams
04
Nov
2025

How chatbots can help spread scams

Cybercriminals have tricked X’s AI chatbot into promoting phishing scams in a technique that has been nicknamed “Grokking”. Here’s what…

OAIC Reports Continued Rise in Notifiable Data Breaches in First Half of 2025
04
Nov
2025

OAIC Reports Continued Rise in Notifiable Data Breaches in First Half of 2025

The Office of the Australian Information Commissioner (OAIC) has released its latest Notifiable Data Breaches (NDB) report and dashboard for January to…

AMD Zen 5 Processors RDSEED Vulnerability Breaks Integrity With Randomness
04
Nov
2025

AMD Zen 5 Processors RDSEED Vulnerability Breaks Integrity With Randomness

AMD has disclosed a critical vulnerability affecting its Zen 5 processor lineup that compromises the reliability of random number generation,…

Why software patching matters more than ever
04
Nov
2025

Why software patching matters more than ever

As the number of software vulnerabilities continues to increase, delaying or skipping security updates could cost your business dearly. 14…

Open VSX Registry Addresses Leaked Tokens and Malicious Extensions in Wake of Security Scare
04
Nov
2025

Open VSX Registry Addresses Leaked Tokens and Malicious Extensions in Wake of Security Scare

The Open VSX Registry and the Eclipse Foundation have completed their investigation into a significant security incident involving exposed developer…