Assessing the risk of AI in enterprise IT
14
Jul
2025

Assessing the risk of AI in enterprise IT

Given the level of tech industry activity in artificial intelligence (AI), if they haven’t already, most IT leaders are going…

Intigriti teams with NVIDIA to launch bug bounty and vulnerability disclosure program (VDP)
14
Jul
2025

Intigriti teams with NVIDIA to launch bug bounty and vulnerability disclosure program (VDP)

With an expanding threat landscape, a surge in AI-driven products, and a commitment to innovation, NVIDIA is enhancing cybersecurity with…

week in security
14
Jul
2025

A week in security (July 7 – July 13)

July 10, 2025 – Deepfake attacks aren’t just for recruitment and banking fraud; they’ve now reached the highest levels of…

FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare
14
Jul
2025

FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare

In this Help Net Security interview, Gail Hodges, Executive Director at the OpenID Foundation, discusses how the Foundation ensures global…

Grok-4 Jailbreaked With Combination of Echo Chamber and Crescendo Attack
14
Jul
2025

Grok-4 Jailbreaked With Combination of Echo Chamber and Crescendo Attack

Grok-4 has been jailbroken using a new strategy that combines two different jailbreak methods to bypass artificial intelligence security measures….

WinRAR 0‑Day Exploit Listed for $80K on Dark Web Forum
14
Jul
2025

WinRAR 0‑Day Exploit Listed for $80K on Dark Web Forum

A sophisticated zero-day exploit targeting WinRAR, one of the world’s most popular file compression utilities, has surfaced on a dark…

pqcscan: Open-source post-quantum cryptography scanner
14
Jul
2025

pqcscan: Open-source post-quantum cryptography scanner

pqcscan is an open-source tool that lets users scan SSH and TLS servers to see which Post-Quantum Cryptography (PQC) algorithms…

eSIM Vulnerability
14
Jul
2025

eSIM Vulnerability in Kigen’s eUICC Cards Exposes Billions of IoT Devices to Malicious Attacks

Jul 14, 2025Ravie LakshmananMobile Security / Vulnerability Cybersecurity researchers have discovered a new hacking technique that exploits weaknesses in the…

Grok-4 Jailbroken Using Echo Chamber and Crescendo Exploit Combo
14
Jul
2025

Grok-4 Jailbroken Using Echo Chamber and Crescendo Exploit Combo

Security researchers have successfully demonstrated a sophisticated jailbreak attack against Grok-4, X’s advanced AI language model, by combining two powerful…

Why your Microsoft 365 setup might be more vulnerable than you think
14
Jul
2025

Why your Microsoft 365 setup might be more vulnerable than you think

60% of organizations rate their Microsoft 365 security as “established” or “advanced”, according to CoreView. Yet, 60% of those same…

Ransomware drops, but don't relax yet
14
Jul
2025

Ransomware drops, but don’t relax yet

WatchGuard has released its latest Internet Security Report, covering malware, network, and endpoint threats spotted by its Threat Lab in…

Legal gaps in AI are a business risk, not just a compliance issue
14
Jul
2025

Legal gaps in AI are a business risk, not just a compliance issue

A new report from Zendesk outlines a growing problem for companies rolling out AI tools: many aren’t ready to manage…