China bans U.S. and Israeli cybersecurity software over security concerns

China has told domestic firms to stop using U.S. and Israeli cybersecurity software, citing national security concerns amid rising tech tensions. Reuters reported that China has ordered domestic companies... Read more »

Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses

Microsoft has announced a coordinated legal action in the United States and the United Kingdom to disrupt RedVDS, a global cybercrime subscription service tied to large-scale fraud losses. The... Read more »

LinkedIn wants to make verification a portable trust signal

In this Help Net Security interview, Oscar Rodriguez, VP Trust Product at LinkedIn, discusses how verification is becoming a portable trust signal across the internet. He explains how LinkedIn... Read more »

QR codes are getting colorful, fancy, and dangerous

QR codes have become a routine part of daily life, showing up on emails, posters, menus, invoices, and login screens. Security-savvy users have learned to treat links with caution,... Read more »

CISOs flag gaps in third-party risk management

Third-party cyber risk continues to concern security leaders as vendor ecosystems grow, supply chains stretch, and AI plays a larger role in business operations. A recent Panorays survey of... Read more »

The NSA lays out the first steps for zero trust adoption

Security pros often say that zero trust sounds straightforward until they try to apply it across real systems, real users, and real data. Many organizations are still sorting out... Read more »

Cybersecurity spending keeps rising, so why is business impact still hard to explain?

Cybersecurity budgets keep climbing, but many security leaders still struggle to explain what that spending delivers to the business. A new study by Expel examines that disconnect through a... Read more »

This WhatsApp Link Can Hand Over Your Account in Seconds

A sophisticated phishing campaign impersonating WhatsApp Web uses fake meeting links and QR codes to hijack accounts and enable real-time surveillance. The post This WhatsApp Link Can Hand Over... Read more »

CERT-UA reports PLUGGYAPE cyberattacks on defense forces

CERT-UA reported PLUGGYAPE malware attacks on Ukraine’s defense forces, linked with medium confidence to Russia’s Void Blizzard group. The Computer Emergency Response Team of Ukraine (CERT-UA) reported new cyberattacks... Read more »

Fortinet fixed two critical flaws in FortiFone and FortiSIEM

Fortinet fixed six security flaws, including two critical bugs in FortiFone and FortiSIEM that attackers could exploit without authentication. Fortinet released patches for six vulnerabilities, including two critical flaws... Read more »
Subscribe to our Newsletter