Taking over millions of developers exploiting an Open VSX Registry flaw

A critical flaw in Open VSX Registry could let attackers hijack the VS Code extension hub, exposing millions of developers to supply chain attacks. Cybersecurity researchers at Koi Security... Read more »

What is phishing? Understanding enterprise phishing threats

Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person to trick users into revealing sensitive information. Read more »

Citrix Bleed 2 under active attack, reports suggest

Days after news emerged of a new Citrix NetScaler flaw comparable in its scope and severity to 2023’s infamous Citrix Bleed, there are already clear indicators that threat actors... Read more »

Scattered Spider cyber gang turns fire on aviation sector

Multiple reports are emerging of cyber attacks on airlines – Google Cloud’s Mandiant believes them to be linked. Read more »

OneClik APT campaign targets energy sector with stealthy backdoors

A OneClik campaign, likely carried out by China-linked actor, targets energy sectors using stealthy ClickOnce and Golang backdoors. Trellix cybersecurity researchers uncovered a new APT malware campaign, OneClik, targeting... Read more »

Over 2 million affected by US supermarket breach

Belgian-Dutch supermarket operator Ahold Delhaize reveals that over two million people, including employees, had their data compromised following a November 2024 ransomware attack. Read more »

Ciaran Martin: AI might disturb attacker-defender security balance

The founder of the National Cyber Security Centre spoke with Computer Weekly at Infosecurity Europe 2025 about how artificial intelligence might disturb the attacker-defender security equilibrium Read more »

APT42 impersonates cyber professionals to phish Israeli academics and journalists

Iran-linked APT42 targets Israeli experts with phishing attacks, posing as security professionals to steal email credentials and 2FA codes. Iran-linked group APT42 (aka Educated Manticore, Charming Kitten, and Mint Sandstorm)... Read more »

Money mule networks evolve into hierarchical, business-like criminal enterprises

In this Help Net Security interview, Michal Tresner, CEO of ThreatMark, discusses how cybercriminals are weaponizing AI, automation, and social engineering to industrialize money mule operations. He looks at... Read more »

Managing through chaos to secure networks

Every time there’s a natural or manmade disaster that takes medical equipment offline, cuts connectivity to emergency services and loved ones, or shuts down access to ATMs, network engineers... Read more »
Subscribe to our Newsletter