Interview: Bridgette McAdoo of Genesys on steering sustainability goals to success
As a play on the word “genesis”, the company’s brand evokes beginnings and new life, but for chief sustainability officer (CSO) Bridgette McAdoo, arriving at…
As a play on the word “genesis”, the company’s brand evokes beginnings and new life, but for chief sustainability officer (CSO) Bridgette McAdoo, arriving at…
Dissecting a new malspam chain delivering Purelogs infostealer Pierluigi Paganini November 26, 2025 The AISI Research Center’s Cybersecurity Observatory publishes the report “Dissecting a new…
Nov 26, 2025Ravie LakshmananMalware / Cyber Espionage The threat actors behind a malware family known as RomCom targeted a U.S.-based civil engineering company via a…
Security researchers at Cato CTRL have discovered a new indirect prompt injection technique called HashJack, which weaponises legitimate websites to manipulate AI browser assistants. The attack…
Phishing sites keep rising, and security teams are searching for ways to sort suspicious pages at speed. A recent study explores whether small language models…
The Tor Project has announced a significant cryptographic overhaul, retiring its legacy relay encryption algorithm after decades of service and replacing it with Counter Galois…
In this Help Net Security interview, Marina Marceta, CISO at Heineken, discusses what it takes for CISOs to be seen as business-aligned leaders rather than…
A significant issue has been disclosed that affects multiple versions of the identity and access management platform. The flaw stems from a hardcoded default encryption…
News Corp Australia has named IAG’s Nandor Locher as its next chief digital and technology officer (CDTO), starting in March next year. Nandor Locher. Locher…
Microsoft has announced a significant update to the Teams Desktop Client for Windows that aims to enhance performance and reduce startup times for calling features.…
Water Gamayun, a Russia‑aligned advanced persistent threat (APT) group, has launched a new multi‑stage intrusion campaign that weaponizes the recently disclosed MSC EvilTwin vulnerability in…
Security teams are pushing large language models into products faster than they can test them, which makes any new red teaming method worth paying attention…