A sophisticated Python-based information stealer named XillenStealer has emerged as a significant threat to Windows users, designed to harvest sensitive…
American First Finance, LLC, a Dallas-based financial services firm, suffered a significant insider breach when a recently terminated employee exploited…
The Electronic Frontier Foundation (EFF) has released Rayhunter, a new open-source tool designed to detect cell site simulators (CSS). These…
Sep 17, 2025Ravie LakshmananData Breach / Cybercrime The U.S. Department of Justice (DoJ) on Tuesday resentenced the former administrator of…
ThreatLocker has a new office in Brisbane, Australia. ThreatLocker CEO and Co-Founder Danny Jenkins and COO and Co-Founder Sami Jenkins…
A critical vulnerability in Windows Boot Manager, known as bitpixie, enables attackers to bypass BitLocker drive encryption and escalate local privileges on…
A sophisticated new campaign that represents the first documented real-world deployment of FileFix attacks beyond proof-of-concept demonstrations. This campaign marks…
Researchers have introduced a new way to study and defend against ICS threats. Their project, called ICSLure, is a honeynet…
Apple backports fix for actively exploited CVE-2025-43300 Pierluigi Paganini September 17, 2025 Apple announced it has backported patches for a…
ThreatLocker has a new office in Brisbane, Australia. ThreatLocker CEO and Co-Founder Danny Jenkins and COO and Co-Founder Sami Jenkins…
The cybersecurity landscape has witnessed a dramatic escalation in API-targeted attacks during the first half of 2025, with security researchers…
In this Help Net Security interview, Marco Goldberg, Managing Director at EQS Group, discusses how compliance and regulation are evolving…











