A New Platform Is Launching to Protect Public Servants From an Angry Mob
09
Sep
2025

A New Platform Is Launching to Protect Public Servants From an Angry Mob

A first-of-its-kind marketplace rolled out on Tuesday offering free and discounted privacy and security services to America’s 23 million current…

SAP Security Patch Day Addresses 21 Vulnerabilities, 4 Classified as Critical
09
Sep
2025

SAP Security Patch Day Addresses 21 Vulnerabilities, 4 Classified as Critical

SAP’s Security Patch Day on September 9, 2025, introduced fixes for 21 newly discovered vulnerabilities across its product portfolio and…

Lessons from Jaguar Land Rover: how can businesses prepare for cyberattacks?
09
Sep
2025

Lessons from Jaguar Land Rover: how can businesses prepare for cyberattacks?

A single cyber incident can halt production lines, dent customer confidence, and wipe millions off a company’s share price –…

New Technique Uncovered To Exploit Linux Kernel Use-After-Free Vulnerability
09
Sep
2025

New Technique Uncovered To Exploit Linux Kernel Use-After-Free Vulnerability

A new technique to exploit a complex use-after-free (UAF) vulnerability in the Linux kernel successfully bypasses modern security mitigations to gain root…

Jaguar Land Rover Halts Operations Longer Due to Cyberattack Impact
09
Sep
2025

Jaguar Land Rover Halts Operations Longer Due to Cyberattack Impact

Jaguar Land Rover’s UK factories will remain closed until at least Wednesday as the company continues to recover from a…

How Leading CISOs are Getting Budget Approval
09
Sep
2025

How Leading CISOs are Getting Budget Approval

It’s budget season. Once again, security is being questioned, scrutinized, or deprioritized. If you’re a CISO or security leader, you’ve…

Hackers Accessed Email Account Contains Valid Credentials
09
Sep
2025

Hackers Accessed Email Account Contains Valid Credentials

Elastic has disclosed a security incident stemming from a third-party breach at Salesloft Drift, which resulted in unauthorized access to…

New Malware Exploits Exposed Docker APIs to Gain Persistent Root SSH Access
09
Sep
2025

New Malware Exploits Exposed Docker APIs to Gain Persistent Root SSH Access

The Akamai Hunt Team has uncovered a new strain of malware that targets exposed Docker APIs with expanded infection capabilities….

09
Sep
2025

Are we headed for an AI culture war?

In this Help Net Security video, Matt Fangman, Field CTO at SailPoint, discusses whether an AI culture war is inevitable….

AI-powered Email Attack Tool Used By Hackers To Launch Massive Phishing Attack
09
Sep
2025

AI-powered Email Attack Tool Used By Hackers To Launch Massive Phishing Attack

A sophisticated new cybercrime toolkit named SpamGPT is enabling hackers to launch massive and highly effective phishing campaigns by combining…

MostereRAT Exploits AnyDesk and TightVNC for Remote Access on Windows Systems
09
Sep
2025

MostereRAT Exploits AnyDesk and TightVNC for Remote Access on Windows Systems

Cybersecurity researchers at FortiGuard Labs have uncovered a sophisticated phishing campaign that deploys the MostereRAT remote access trojan to compromise…

09
Sep
2025

Ongoing malvertising campaign targets European IT workers with fake GitHub Desktop installers

Researchers have spotted a malvertising (and clever malware delivery) campaign targeting IT workers in the European Union with fake GitHub…