Black Friday 2025 for InfoSec: How to spot real value and avoid the noise

Your inbox is probably drowning in Black Friday emails right now. Another “limited time offer” that’ll reappear next month, countdown timer creating artificial urgency. You’re right to be skeptical... Read more »

US breach reinforces need to plug third-party security weaknesses

Cyber breach at US financial sector tech provider highlights the risk of third-party vulnerabilities in finance ecosystems Read more »

DeepTeam: Open-source LLM red teaming framework

Security teams are pushing large language models into products faster than they can test them, which makes any new red teaming method worth paying attention to. DeepTeam is an... Read more »

How board members think about cyber risk and what CISOs should tell them

In this Help Net Security video, Jonathan Trull, EVP & CISO at Qualys, discusses which cybersecurity metrics matter most to a board of directors. Drawing on more than two... Read more »

Critical Firefox Bug Leaves 180M Users Exposed

A hidden WebAssembly bug in Firefox exposed 180 million users to potential code execution. The post Critical Firefox Bug Leaves 180M Users Exposed appeared first on TechRepublic. Read more »

FBI: bank impersonators fuel $262M surge in account takeover fraud

Cybercriminals posing as banks drove a major spike in account takeover fraud this year, stealing over $262 million, the FBI warned. The FBI warns of a surge in account... Read more »

Popular code formatting sites are exposing credentials and other secrets

Widely used code formatting sites JSONFormatter and CodeBeautify are exposing sensitive credentials, API keys, private keys, configuration files and other secrets, watchTowr researchers discovered. The findings JSONFormatter and CodeBeautify... Read more »

Morphisec warns StealC V2 malware spread through weaponized blender files

StealC V2 spread via malicious Blender files on 3D model sites like CGTrader, abusing Blender’s ability to run hidden Python scripts. Cybersecurity firm Morphisec reported that Russian threat actors are... Read more »

Tor Project is rolling out Counter Galois Onion encryption

People who rely on Tor expect their traffic to move through the network without giving away who they are. That trust depends on the strength of the encryption that... Read more »

Fake “Windows Update” screens fuels new wave of ClickFix attacks

A convincing (but fake) “Windows Update” screen can be the perfect lure for tricking users into infecting their computers with malware. Add a multi-stage delivery chain with some offbeat... Read more »
Subscribe to our Newsletter