The Rise of AI-Driven API Vulnerabilities
26
Jun
2025

The Rise of AI-Driven API Vulnerabilities

AI has had dramatic impacts on almost every facet of every industry. API security is no exception. Up until recently,…

CISA Warns of Fortinet FortiOS Hard-Coded Credentials Vulnerability Exploited in Attacks
26
Jun
2025

CISA Warns of Fortinet FortiOS Hard-Coded Credentials Vulnerability Exploited in Attacks

CISA has issued a critical warning regarding a Fortinet FortiOS vulnerability that poses significant risks to network security infrastructure.  On…

CISA Issues Alert on ControlID iDSecure Flaws Enabling Bypass Authentication
26
Jun
2025

CISA Issues Alert on ControlID iDSecure Flaws Enabling Bypass Authentication

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding critical vulnerabilities in ControlID’s iDSecure On-premises software,…

Google's Gemini CLI brings open-source AI agents to developers
26
Jun
2025

Google’s Gemini CLI brings open-source AI agents to developers

Google has open-sourced a command-line interface (CLI) agent built on its Gemini 1.5 Pro model, marking a notable step toward…

Multiple Brother Devices Vulnerabilities Open Devices for Hacking
26
Jun
2025

Multiple Brother Devices Vulnerabilities Open Devices for Hacking

A comprehensive security research investigation has unveiled eight critical vulnerabilities affecting 742 printer and multifunction device models across four major…

MOVEit Transfer Systems Hit by Wave of Attacks Using Over 100 Unique IPs
26
Jun
2025

MOVEit Transfer Systems Hit by Wave of Attacks Using Over 100 Unique IPs

A dramatic surge in scanning and exploitation activity targeting Progress Software’s MOVEit Transfer file-sharing platform has alarmed cybersecurity researchers and…

Building cyber resilience in always-on industrial environments
26
Jun
2025

Building cyber resilience in always-on industrial environments

In this Help Net Security interview, Dr. Tim Sattler, CISO at Jungheinrich, discusses the cybersecurity risks tied to smart warehouses…

WhatsApp Adds AI-Powered Message Summaries for Faster Chat Previews
26
Jun
2025

WhatsApp Adds AI-Powered Message Summaries for Faster Chat Previews

Jun 26, 2025Ravie LakshmananArtificial Intelligence / Data Protection Popular messaging platform WhatsApp has added a new artificial intelligence (AI)-powered feature…

Beware of Weaponized Wedding Invite Scams That Deploys SpyMax RAT on Android Devices
26
Jun
2025

Beware of Weaponized Wedding Invite Scams That Deploys SpyMax RAT on Android Devices

A sophisticated Android phishing campaign has emerged across India, exploiting the cultural significance of wedding invitations to distribute malicious software….

Authorities Arrest Five Operators Behind Infamous BreachForums Cybercrime Hub
26
Jun
2025

Authorities Arrest Five Operators Behind Infamous BreachForums Cybercrime Hub

In a sweeping crackdown that has sent shockwaves through the global cybercrime community, French authorities have arrested five key operators…

When synthetic identity fraud looks just like a good customer
26
Jun
2025

When synthetic identity fraud looks just like a good customer

People may assume synthetic identity fraud has no victims. They believe fake identities don’t belong to real people, so no…

New Malware Spotted in The Wild Using Prompt Injection to Manipulate AI Models Processing Sample
26
Jun
2025

New Malware Spotted in The Wild Using Prompt Injection to Manipulate AI Models Processing Sample

Cybersecurity researchers have discovered a groundbreaking new malware strain that represents the first documented attempt to weaponize prompt injection attacks…