Unpatched Windows Server vulnerability allows full domain compromise

A privilege escalation vulnerability in Windows Server 2025 can be used by attackers to compromise any user in Active Directory (AD), including Domain Admins. “The [“BadSuccessor”] attack exploits the... Read more »

StackHawk raises $12 million to help security teams tackle AI-powered dev cycles

StackHawk, the shift-left API security platform, announced it has taken on $12 million in additional funding from Sapphire and Castanoa Ventures to help security teams keep up with the... Read more »

Druva strengthens cyber resilience across Microsoft Azure environments

Druva announced comprehensive protection for Azure SQL and Azure Blob Storage. Building on Druva’s strategic relationship with Microsoft, these enhancements help enterprises reduce risk, control costs, and improve operational... Read more »

Signal blocks Microsoft Recall from screenshotting conversations

Signal has released a new version of its end-to-end encrypted communication app for Windows that prevents Microsoft Recall and users from screenshotting text-based conversations happening in the app. The... Read more »

The hidden gaps in your asset inventory, and how to close them

In this Help Net Security interview, Tim Grieveson, CSO at ThingsRecon, breaks down the first steps security teams should take to regain visibility, the most common blind spots in... Read more »

CTM360 report: Ransomware exploits trust more than tech

A recent wave of ransomware attacks has disrupted major retailers across the UK. According to a new report from CTM360, the attackers didn’t need to break down the door,... Read more »

Many rush into GenAI deployments, frequently without a security net

70% percent of organizations view the pace of AI development, particularly in GenAI, as the leading security concern related to its adoption, followed by lack of data integrity (64%)... Read more »

Review: CompTIA Network+ Study Guide, 6th Edition

If you’re planning to tackle the CompTIA Network+ certification (N10-009), chances are you’ve already come across the name Todd Lammle. A long-established authority in the networking and certification world,... Read more »

Be careful what you share with GenAI tools at work

We use GenAI at work to make tasks easier, but are we aware of the risks? According to Netskope, the average organization now shares more than 7.7GB of data... Read more »

Lumma Stealer Malware-as-a-Service operation disrupted

A coordinated action by US, European and Japanese authorities and tech companies like Microsoft and Cloudflare has disrupted the infrastructure behind Lumma Stealer, the most significant infostealer threat at... Read more »
Subscribe to our Newsletter