APIs and hardware are under attack, and the numbers don't look good
24
Sep
2025

APIs and hardware are under attack, and the numbers don’t look good

Attackers have a new favorite playground, and it’s not where many security teams are looking. According to fresh data from…

Libraesva Email Security Gateway Vulnerability
24
Sep
2025

State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability

Sep 24, 2025Ravie LakshmananVulnerability / Email Security Libraesva has released a security update to address a vulnerability in its Email…

CISA Details That Hackers Gained Access to a U.S. Federal Agency Network Via GeoServer RCE Vulnerability
24
Sep
2025

CISA Details That Hackers Gained Access to a U.S. Federal Agency Network Via GeoServer RCE Vulnerability

CISA has released a comprehensive cybersecurity advisory detailing how threat actors successfully compromised a U.S. federal civilian executive branch agency’s…

ShadowV2 Botnet Infects AWS Docker Containers to Launch DDoS Campaign
24
Sep
2025

ShadowV2 Botnet Infects AWS Docker Containers to Launch DDoS Campaign

Darktrace’s latest investigation uncovered a novel campaign that blends traditional malware with modern DevOps technology. At the center of this…

Building a stronger SOC through AI augmentation
24
Sep
2025

Building a stronger SOC through AI augmentation

In this Help Net Security interview, Tim Bramble, Director of Threat Detection and Response at OpenText, discusses how SOC teams…

Cloudflare mitigates largest-ever DDoS attack at 22.2 Tbps
24
Sep
2025

Cloudflare mitigates largest-ever DDoS attack at 22.2 Tbps

Cloudflare mitigates largest-ever DDoS attack at 22.2 Tbps Pierluigi Paganini September 24, 2025 Cloudflare blocked a new record-breaking DDoS attack…

New “YiBackdoor” Malware Lets Hackers Run Commands and Steal Data
24
Sep
2025

New “YiBackdoor” Malware Lets Hackers Run Commands and Steal Data

Cybersecurity researchers at Zscaler ThreatLabz have identified a sophisticated new malware strain dubbed YiBackdoor, first detected in June 2025. This…

Nosey Parker: Open-source tool finds sensitive information in textual data and Git history
24
Sep
2025

Nosey Parker: Open-source tool finds sensitive information in textual data and Git history

Nosey Parker is an open-source command-line tool that helps find secrets and sensitive information hidden in text files. It works…

Building AI responsibly from day one
24
Sep
2025

Building AI responsibly from day one

In this Help Net Security video, David Hardoon, Global Head of AI Enablement at Standard Chartered, discusses the role of…

Optus says traffic not diverted away from firewall before upgrade
24
Sep
2025

Optus says traffic not diverted away from firewall before upgrade

A firewall upgrade at Optus that caused Triple Zero calls to fail for 13 hours did not follow internal traffic…

A look inside 1,000 cyber range events and what they reveal about AppSec
24
Sep
2025

A look inside 1,000 cyber range events and what they reveal about AppSec

Software powers almost every part of business, which means attackers have more chances than ever to exploit insecure code. A…

Chrome High-severity Vulnerabilities Let Attackers Access Sensitive Data and Crash System
24
Sep
2025

Chrome High-severity Vulnerabilities Let Attackers Access Sensitive Data and Crash System

Google has issued an urgent security update for its Chrome web browser to address three high-severity vulnerabilities that could allow…