Russia warns financial sector organizations of IT service provider LANIT compromise
25
Feb
2025

Russia warns financial sector organizations of IT service provider LANIT compromise

Russia warns financial sector organizations of IT service provider LANIT compromise Pierluigi Paganini February 25, 2025 Russia’s NKTsKI warns financial…

LightSpy Malware Expands with 100+ Commands to Target Users Across All Major OS Platforms
25
Feb
2025

LightSpy Malware Expands with 100+ Commands to Target Users Across All Major OS Platforms

The LightSpy surveillance framework has significantly evolved its operational capabilities, now supporting over 100 commands to infiltrate Android, iOS, Windows,…

Hackers Evade Outlook Spam Filters to Deliver Malicious ISO Files
25
Feb
2025

Hackers Evade Outlook Spam Filters to Deliver Malicious ISO Files

A newly discovered technique allows threat actors to circumvent Microsoft Outlook’s spam filters to deliver malicious ISO files, exposing organizations…

Naveen Goud
25
Feb
2025

Google to replace SMS authentication with QR Codes for enhanced Mobile Security

Google is strengthening online security by transitioning from SMS-based authentication codes to more secure QR codes, providing a robust defense…

Chinese Cloud Services
25
Feb
2025

FatalRAT Phishing Attacks Target APAC Industries Using Chinese Cloud Services

Various industrial organizations in the Asia-Pacific (APAC) region have been targeted as part of phishing attacks designed to deliver a…

Rethinking the route to net zero
25
Feb
2025

Rethinking the route to net zero

Thank you for joining! Access your Pro+ Content below. 25 February 2025 Rethinking the route to net zero Share this…

Critical RCE Vulnerability in MITRE Caldera – Proof of Concept Released
25
Feb
2025

Critical RCE Vulnerability in MITRE Caldera – Proof of Concept Released

A critical remote code execution (RCE) vulnerability has been uncovered in MITRE Caldera, a widely used adversarial emulation framework. The…

Naveen Goud
25
Feb
2025

Top Mobile Security Courses for App Developers

As the demand for mobile applications continues to soar, so does the importance of ensuring their security. With cyber threats…

Oracle Agile Vulnerability Actively Exploited
25
Feb
2025

Oracle Agile Vulnerability Actively Exploited

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding active exploitation of a severe deserialization…

25
Feb
2025

Avoiding vendor lock-in when using managed cloud security services

In this Help Net Security interview, Marina Segal, CEO at Tamnoon, discusses the most significant obstacles when implementing managed cloud…

Uncovering a New Side-Channel Attack on Data Structures
25
Feb
2025

Uncovering a New Side-Channel Attack on Data Structures

Researchers at Graz University of Technology have uncovered a groundbreaking software-based side-channel attack, KernelSnitch, which exploits timing variances in Linux kernel…

25
Feb
2025

The CISO’s dilemma of protecting the enterprise while driving innovation

CISOs are constantly navigating the challenge of protecting their organizations while ensuring business agility and innovation. For example, as companies…