Cybersecurity AI (CAI): Open-source framework for AI security
22
Sep
2025

Cybersecurity AI (CAI): Open-source framework for AI security

Cybersecurity AI (CAI) is an open-source framework that helps security teams build and run AI-driven tools for offensive and defensive…

BlackLock Ransomware Attacking Windows, Linux, and VMware ESXi Environments
22
Sep
2025

BlackLock Ransomware Attacking Windows, Linux, and VMware ESXi Environments

A sophisticated new ransomware operation dubbed BlackLock has emerged as a significant threat to organizations worldwide, demonstrating advanced cross-platform capabilities…

A Cyberattack on Jaguar Land Rover Is Causing a Supply Chain Disaster
22
Sep
2025

A Cyberattack on Jaguar Land Rover Is Causing a Supply Chain Disaster

Almost immediately after the cyberattack, a group on Telegram called Scattered Lapsus$ Hunters, claimed responsibility for the hack. The group…

Threat Actors Market Stealthy New RAT as Alternative to ScreenConnect FUD
22
Sep
2025

Threat Actors Market Stealthy New RAT as Alternative to ScreenConnect FUD

Cybersecurity researchers have identified a concerning development in the underground cybercrime marketplace: a sophisticated Remote Access Trojan (RAT) being marketed…

How Juventus protects fans, revenue, and reputation during matchdays
22
Sep
2025

How Juventus protects fans, revenue, and reputation during matchdays

In this Help Net Security interview, Mirko Rinaldini, Head of ICT at Juventus Football Club, discusses the club’s approach to…

Microsoft Patches Critical Entra ID Flaw Enabling Global Admin Impersonation Across Tenants
22
Sep
2025

Microsoft Patches Critical Entra ID Flaw Enabling Global Admin Impersonation Across Tenants

A critical token validation failure in Microsoft Entra ID (previously Azure Active Directory) could have allowed attackers to impersonate any…

New GPT-4-Powered Malware That Writes Its Own Ransomware
22
Sep
2025

New GPT-4-Powered Malware That Writes Its Own Ransomware

A groundbreaking discovery in cybersecurity research has revealed the emergence of ‘MalTerminal’, potentially the earliest known example of Large Language Model…

Kubernetes matures as AI and GitOps reshape operations
22
Sep
2025

Kubernetes matures as AI and GitOps reshape operations

Kubernetes has moved well past its early adoption phase. The new Komodor 2025 Enterprise Kubernetes Report shows that technical teams…

AI needs ethics to avoid real-world harm
22
Sep
2025

AI needs ethics to avoid real-world harm

In this Help Net Security video, Brittany Allen, Senior Trust and Safety Architect at Sift, explores how the rise of…

Optus errors result in multiple fatalities; Independent Review Launched
22
Sep
2025

Optus errors result in multiple fatalities; Independent Review Launched

Australian telco Optus is under intense scrutiny following a major technical failure that left parts of the country unable to access Triple…

NIST invites comment on Migration to Post-Quantum Cryptography
22
Sep
2025

NIST invites comment on Migration to Post-Quantum Cryptography

The NIST National Cybersecurity Center of Excellence (NCCoE) has published an initial public draft of NIST Cybersecurity White Paper (CSWP) 48,…

Optus accused of low-effort,
22
Sep
2025

Optus accused of low-effort, “inaccurate” outage notifications

Optus initially characterised its Triple Zero outage in emails to government officials on Thursday afternoon as impacting just 10 calls,…