Where policy meets profit: Navigating the new frontier of defense tech startups
11
Jul
2025

Where policy meets profit: Navigating the new frontier of defense tech startups

In this Help Net Security interview, Thijs Povel, Managing Partner at Ventures.eu, discusses how the firm evaluates emerging technologies through…

CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
11
Jul
2025

CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting Citrix NetScaler ADC and…

Employees are quietly bringing AI to work and leaving security behind
11
Jul
2025

Employees are quietly bringing AI to work and leaving security behind

While IT departments race to implement AI governance frameworks, many employees have already opened a backdoor for AI, according to…

Palo Alto Networks GlobalProtect Vulnerability Enabling Root-Level Access
11
Jul
2025

Palo Alto Networks GlobalProtect Vulnerability Enabling Root-Level Access

Palo Alto Networks has disclosed a significant security vulnerability in its Autonomous Digital Experience Manager software that could allow attackers…

New infosec products of the week: July 11, 2025
11
Jul
2025

New infosec products of the week: July 11, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Barracuda Networks, Cynomi, Lepide, Tosibox,…

The Investcorp fund is intended to support HWG Sababa's growth
11
Jul
2025

Investcorp establishes a fund to support an Italian cybersecurity firm.

Investcorp to provide backing for Sababa Fund supported by Hayfin and Coller Sababa aims for expansion in the Middle East…

Comment Period Extension for NIST HPC Security Overlay
11
Jul
2025

Comment Period Extension for NIST HPC Security Overlay

The initial public draft (IPD) of NIST Special Publication (SP) 800-234, High-Performance Computing (HPC) Security Overlay, is available for public comment…

McDonald’s McHire Vulnerability Leaked Data of 64 Million Job Seekers
11
Jul
2025

McDonald’s AI Hiring Tool McHire Leaked Data of 64 Million Job Seekers

Major security flaw in McDonald’s AI hiring tool McHire exposed 64M job applications. Discover how an IDOR vulnerability and weak…

McDonald’s McHire Vulnerability Leaked Data of 64 Million Job Seekers
11
Jul
2025

McDonald’s McHire Vulnerability Leaked Data of 64 Million Job Seekers

Major security flaw in McDonald’s McHire platform exposed 64M job applications. Discover how an IDOR vulnerability and weak default credentials…

Hackers Exploit GitHub to Distribute Malware Disguised as VPN Software
11
Jul
2025

Hackers Exploit GitHub to Distribute Malware Disguised as VPN Software

CYFIRMA has discovered a sophisticated cyberattack campaign in which threat actors are using GitHub to host and disseminate malware masquerading…

New ZuRu Malware Variant Attacking macOS Users Via Weaponized Termius App
11
Jul
2025

New ZuRu Malware Variant Attacking macOS Users Via Weaponized Termius App

A sophisticated new variant of the macOS.ZuRu malware has emerged, targeting macOS users through a weaponized version of the popular…

DHS Tells Police That Common Protest Activities Are ‘Violent Tactics’
11
Jul
2025

DHS Tells Police That Common Protest Activities Are ‘Violent Tactics’

DHS’s risk-based approach reflects a broader shift in US law enforcement shaped by post-9/11 security priorities—one that elevates perceived intent…