What a mature OT security program looks like in practice
17
Jul
2025

What a mature OT security program looks like in practice

In this Help Net Security interview, Cindy Segond von Banchet CC, Cybersecurity Lead at Yokogawa Europe, shares her insights on…

Cameron John Wagenius
17
Jul
2025

Cameron John Wagenius Pleads Guilty To Active-Duty Hacking

A former US Army soldier posted in Texas has pleaded guilty to charges linked to a large scale cybercrime conspiracy…

FortiWeb Systems Compromised via Webshells After Public PoC Release
17
Jul
2025

FortiWeb Systems Compromised via Webshells After Public PoC Release

A widespread cyberattack campaign has successfully compromised dozens of Fortinet FortiWeb instances through webshell deployment, exploiting a critical vulnerability for…

Why silent authentication is the smarter way to secure BYOD
17
Jul
2025

Why silent authentication is the smarter way to secure BYOD

In this Help Net Security video, Andy Ulrich, CISO at Vonage, explains how silent authentication offers a smarter, seamless solution…

What Fortune 100s are getting wrong about cybersecurity hiring
17
Jul
2025

What Fortune 100s are getting wrong about cybersecurity hiring

Many companies say they can’t find enough cybersecurity professionals. But a new report suggests the real problem isn’t a lack…

TAFE NSW charts $22m ERP upgrade
17
Jul
2025

TAFE NSW charts $22m ERP upgrade

TAFE NSW is preparing to spend almost $22 million on its future enterprise resource planning environment as its SAP platform…

Critical Flaw in Windows Server 2025 exposed
17
Jul
2025

Critical Flaw in Windows Server 2025 exposed

Semperis has released new research detailing Golden dMSA, a critical design flaw active in delegated Managed Service Accounts (dMSAa) in…

Critical Cisco ISE Vulnerability Allows Remote Attacker to Execute Commands as Root User
17
Jul
2025

Critical Cisco ISE Vulnerability Allows Remote Attacker to Execute Commands as Root User

Cisco has disclosed multiple critical security vulnerabilities in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that…

How Secure Is Online Fax: Privacy and Data Protection Standards
17
Jul
2025

Privacy and Data Protection Standards

When it comes to sharing sensitive documents online, security sits at the top of everyone’s checklist. Online faxing is generally considered…

Co-op sign
17
Jul
2025

Co-op confirms data of 6.5 million members stolen in cyberattack

UK retailer Co-op has confirmed that personal data of 6.5 million members was stolen in the massive cyberattack in April…

NoName057(16) cybercrime group targeted in global operation
17
Jul
2025

NoName057(16) cybercrime group targeted in global operation

Germany and Spain issued arrest warrants for seven suspected members of a pro-Russian hacking group accused of carrying out cyber…

Google's AI Tool Big Sleep Uncovered Critical SQLite 0-Day Vulnerability and Blocks Active Exploitation
17
Jul
2025

Google’s AI Tool Big Sleep Uncovered Critical SQLite 0-Day Vulnerability and Blocks Active Exploitation

Google’s revolutionary AI-powered security tool, Big Sleep, has achieved a groundbreaking milestone by discovering and preventing the exploitation of a…