July 3, 2025 – The “El Chapo” Mexican drug cartel snooped on FBI personnel through hacked cameras, and listened in…
Pakistan-based threat actor APT36, also known as Transparent Tribe, has significantly evolved its cyber-espionage capabilities by launching a sophisticated campaign…
Two critical vulnerabilities have been discovered in ScriptCase, a popular low-code PHP web application generator, which puts thousands of servers…
There was a barrage of updates released the week of June 2025 Patch Tuesday. This included security updates from Adobe,…
Security researchers disclosed a critical local privilege escalation (LPE) vulnerability affecting Fedora, SUSE, and other major Linux distributions. The flaw,…
In this Help Net Security interview, John Morello, CTO at Minimus, discusses the security risks in AI-driven development, where many…
Aegis Authenticator is an open-source 2FA app for Android that helps you manage login codes for your online accounts. The…
A hacking group with ties other than Pakistan has been found targeting Indian government organizations with a modified variant of…
Attack Surface Management (ASM) has become one of those buzzwords that gets used a lot but rarely explained in detail….
While most enterprises have integrated cloud resources into their operations, many need to improve their ability to secure these environments…
A proof-of-concept exploit for a critical local privilege escalation vulnerability affecting major Linux distributions, including Fedora and SUSE environments. The…
The ASD’s ACSC has issued a critical alert to its subscriber community concerning vulnerabilities in Citrix Netscaler ADC and NetScaler…











