Credential-harvesting attacks by APT28 hit Turkish, European, and Central Asian organizations

Russia-linked cyberespionage group APT28 targets energy, nuclear, and policy staff in Turkey, Europe, North Macedonia, and Uzbekistan with credential-harvesting attacks. Between February and September 2025, Recorded Future’s Insikt Group... Read more »

Ofcom begins investigation of explicit image generation on Grok

Elon Musk’s Grok image generator, from parent company X, is being investigated by the UK regulator under the Online Safety Act Read more »

Debian 13.3 is now available with targeted corrections, updates

Debian 13.3 is the third maintenance update for the stable Debian 13 distribution, codenamed “trixie”. It updates package content to address security and other issues reported since the last... Read more »

Crypto crime hits record levels as state actors move billions

Nation-state involvement in crypto increased in 2025, signaling a shift in how on-chain crime operates. Three waves of crypto crime (Source: Chainalysis) Research from Chainalysis shows that crypto-related crime... Read more »

Rethinking OT security for project heavy shipyards

In this Help Net Security interview, Hans Quivooij, CISO at Damen Shipyards Group, discusses securing OT and ICS in the shipyard. He outlines how project-based operations, rotating contractors, and... Read more »

pfSense: Open-source firewall and routing platform

Firewalls, VPN access, and traffic rules need steady attention, often with limited budgets and staff. In that context, the open source pfSense Community Edition (CE) continues to show up... Read more »

What security teams can learn from torrent metadata

Security teams often spend time sorting through logs and alerts that point to activity happening outside corporate networks. Torrent traffic shows up in investigations tied to policy violations, insider... Read more »

EU’s Chat Control could put government monitoring inside robots

Cybersecurity debates around surveillance usually stay inside screens. A new academic study argues that this boundary no longer holds when communication laws extend into robots that speak, listen, and... Read more »

Downtime pushes resilience planning into security operations

CISOs describe a shift in how they define success. New research from Absolute Security shows broad agreement that resilience outweighs security goals centered on prevention alone. Security leaders increasingly... Read more »

Intersec Dubai highlights why AI has become critical in the race against cyber attackers

Cigna Healthcare’s Jean Wiles warns that healthcare security teams must act faster without sacrificing accuracy or compliance as threats driven by artificial intelligence scale Read more »
Subscribe to our Newsletter