Cisco Unified CM Vulnerability Allows Remote Attacker to Login As Root User
03
Jul
2025

Cisco Unified CM Vulnerability Allows Remote Attacker to Login As Root User

A severe vulnerability in Cisco Unified Communications Manager (Unified CM) systems could allow remote attackers to gain root-level access to…

Keymous+ Hacker Group Claims Responsibility for Over 700 Global DDoS Attacks
03
Jul
2025

Keymous+ Hacker Group Claims Responsibility for Over 700 Global DDoS Attacks

A shadowy group known as Keymous+ has emerged as a formidable force in the cyber landscape, claiming responsibility for over…

China Linked Houken Hackers Breach French Systems with Ivanti Zero Days
03
Jul
2025

China Linked Houken Hackers Breach French Systems with Ivanti Zero Days

In a report published by ANSSI on July 1, 2025, the French cybersecurity agency revealed a highly skilled cybercrime group,…

90% aren't ready for AI attacks, are you?
03
Jul
2025

90% aren’t ready for AI attacks, are you?

As AI reshapes business, 90% of organizations are not adequately prepared to secure their AI-driven future, according to a new…

Kelly Benefits December data breach impacted over 400,000 individuals
03
Jul
2025

Kelly Benefits data breach has impacted 550,000 people

Kelly Benefits data breach has impacted 550,000 people, and the situation continues to worsen as the investigation progresses Pierluigi Paganini…

03
Jul
2025

What CISA’s BOD 25-01 Means for API Security and How Wallarm Can Help

The US government has taken another significant step towards strengthening cloud security with the release of CISA’s Binding Operational Directive…

Apache Seata Flaw Enables Deserialization of Untrusted Data
03
Jul
2025

Apache Seata Flaw Enables Deserialization of Untrusted Data

A newly disclosed vulnerability in Apache Seata, a popular open-source distributed transaction solution, has raised security concerns for organizations relying…

Ethereum’s Pivotal Role in Decentralized Finance Evolution
03
Jul
2025

Ethereum’s Pivotal Role in Decentralized Finance Evolution

Once upon a time, say, 2016, Ethereum was a curious new arrival in the crypto space. It promised more than…

Healthcare CISOs must secure more than what's regulated
03
Jul
2025

Healthcare CISOs must secure more than what’s regulated

In this Help Net Security interview, Henry Jiang, CISO at Ensora Health, discusses what it really takes to make DevSecOps…

Surge in LNK File Weaponization by 50%, Fueling Four Major Malware Types
03
Jul
2025

Surge in LNK File Weaponization by 50%, Fueling Four Major Malware Types

The weaponization of Windows shortcut (LNK) files for malware distribution has increased by an astounding 50%, according to telemetry data,…

StealthMACsec strengthens Ethernet network security
03
Jul
2025

StealthMACsec strengthens Ethernet network security

StealthCores launched StealthMACsec, a comprehensive IEEE 802.1AE compliant MACsec engine that brings advanced side-channel countermeasures to Ethernet network security. Building…

GitPhish: Open-source GitHub device code flow security assessment tool
03
Jul
2025

GitPhish: Open-source GitHub device code flow security assessment tool

GitPhish is an open-source security research tool built to replicate GitHub’s device code authentication flow. It features three core operating…