Red Bull-Themed Phishing Attacks Target Job Seekers' Credentials
15
Jul
2025

Red Bull-Themed Phishing Attacks Target Job Seekers’ Credentials

A few significant investments in email filtering, authentication procedures, and endpoint protection, attackers are constantly improving their techniques to circumvent…

Securing vehicles as they become platforms for code and data
15
Jul
2025

Securing vehicles as they become platforms for code and data

In this Help Net Security interview, Robert Knoblauch, CISO at Element Fleet Management, discusses how the rise of connected vehicles…

Critical RCE Vulnerability Found in Symantec Endpoint Management Platform
15
Jul
2025

Critical RCE Vulnerability Found in Symantec Endpoint Management Platform

Security researchers at LRQA have uncovered a critical remote code execution (RCE) vulnerability in Broadcom’s Symantec Endpoint Management Suite, formerly…

Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
15
Jul
2025

Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech

For decades, manufacturers and security professionals have been playing a high-stakes game of cat and mouse with counterfeiters. From holograms…

20-year-old Vulnerability in Radio Remote Linking Protocol Let Hackers Control Train Brakes
15
Jul
2025

20-year-old Vulnerability in Radio Remote Linking Protocol Let Hackers Control Train Brakes

CISA has issued a critical advisory warning about a severe vulnerability in railway communication systems that could allow attackers to…

CISA Issues Alert on Actively Exploited Wing FTP Server Vulnerability
15
Jul
2025

CISA Issues Alert on Actively Exploited Wing FTP Server Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Wing FTP Server vulnerability to its Known Exploited Vulnerabilities…

How service providers can turn cybersecurity into a scalable MRR engine
15
Jul
2025

How service providers can turn cybersecurity into a scalable MRR engine

A growing number of MSPs, MSSPs, and consultancies are moving beyond one-and-done engagements and transforming from tactical vendors into strategic…

CISA adds serious Wing FTP Server vulnerability to must-fix list
15
Jul
2025

CISA adds serious Wing FTP Server vulnerability to must-fix list

A remote code execution (RCE) vulnerability in a popular file transfer application is being actively exploited, with the United States…

Stop settling for check-the-box cybersecurity policies
15
Jul
2025

Stop settling for check-the-box cybersecurity policies

After every breach, people ask: How did this happen if there were cybersecurity policies in place? The truth is, just…

Researchers demo AI-crippling GPUHammer attack
15
Jul
2025

Researchers demo AI-crippling GPUHammer attack

Security researchers have successfully demonstrated the first Rowhammer attack targeting graphics processing unit (GPU) memory, revealing a critical vulnerability that…

Cybersecurity jobs available right now: July 15, 2025
15
Jul
2025

Cybersecurity jobs available right now: July 15, 2025

Application Penetration Tester Tata Consultancy Services | Ireland | Hybrid – View job details As an Application Penetration Tester, you…

SMB cybersecurity: Gap between perceived confidence and actual preparedness
15
Jul
2025

SMB cybersecurity: Gap between perceived confidence and actual preparedness

A global study on Information Technology security among small and medium-sized businesses, entitled The State of IT security in SMBs…