Cloudflare to acquire Replicate, aiming for seamless serverless AI at global scale

Cloudflare has agreed to acquire Replicate, an AI platform that makes it easy for developers to deploy and run AI models. This acquisition will accelerate the company’s vision to... Read more »

Jaguar Land Rover confirms major disruption and £196M cost from September cyberattack

Jaguar Land Rover says the September 2025 cyberattack halted production, led to data theft, and cost £196M in the quarter. Jaguar Land Rover reported that a September 2025 cyberattack,... Read more »

Logitech confirms data breach

Logitech, the Swiss multinational electronics and technology company best known for marketing computer peripherals and hardware, has suffered a data breach. “While the investigation is ongoing, at this time... Read more »

DoorDash Hit by Cybersecurity Breach, Millions of Users Potentially Exposed

DoorDash has disclosed a social engineering-driven data breach exposing user contact details in four countries, raising concerns about delayed notification. The post DoorDash Hit by Cybersecurity Breach, Millions of... Read more »

Synack unveils Sara Pentest as a new agentic AI for faster, scalable penetration testing

Synack has announced Sara Pentest, a new agentic AI product built on the Synack Autonomous Red Agent (Sara) architecture. Sara Pentest performs penetration testing on hosts and web applications,... Read more »

Five men admit helping North Korean IT workers infiltrate US companies

US federal prosecutors have secured guilty pleas from five men who helped North Korean IT workers get hired by companies in the United States. This group of domestic facilitators... Read more »

The internet isn’t free: Shutdowns, surveillance and algorithmic risks

Global internet freedom has declined for the 15th straight year, according to the latest Freedom House report. Out of 72 countries evaluated, 28 recorded declines and 17 saw improvements.... Read more »

North Korean threat actors use JSON sites to deliver malware via trojanized code

North Korean Contagious Interview actors now host malware on JSON storage sites to deliver trojanized code projects, NVISO reports. North Korea-linked actors behind the Contagious Interview campaign have updated... Read more »

RondoDox expands botnet by exploiting XWiki RCE bug left unpatched since February 2025

RondoDox botnet exploits unpatched XWiki flaw CVE-2025-24893 to gain RCE and infect more servers, despite fixes released in February 2025. RondoDox is targeting unpatched XWiki servers via critical RCE... Read more »

The tech that turns supply chains from brittle to unbreakable

In this Help Net Security interview, Sev Kelian, CISO and VP of Security at Tecsys, discusses how organizations can strengthen supply chain resilience through a more unified and forward-looking... Read more »
Subscribe to our Newsletter