Law enforcement operation shut down dark web drug marketplace Archetyp Market

Europol shut down Archetyp Market, a major dark web drug marketplace, in a global operation with arrests and takedowns. An international law enforcement operation led by Europol dismantled Archetyp... Read more »

Cyolo expands remote access coverage for OT and cyber-physical systems

Cyolo announced several major new capabilities, headlined by Cyolo Third-Party VPN Control. This capability within the company’s Cyolo PRO (Privileged Remote Operations) solution delivers visibility and access control for... Read more »

History made as MI6 appoints first female Chief

The UK government has appointed Blaise Florence Metreweli as the next Chief of the Secret Intelligence Service (SIS), also known as MI6. Metreweli will take up the role, traditionally... Read more »

SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles

Vulnerabilities affecting the SinoTrack GPS tracking platform may allow attackers to keep tabs on vehicles’ location and even perform actions such as disconnecting power to vehicles’ fuel pump (if... Read more »

Police shut down long-running dark web drug market

Law enforcement authorities across Europe have dismantled Archetyp Market, the most enduring dark web drug market, following a large-scale operation involving six countries, supported by Europol and Eurojust. Between... Read more »

New Anubis RaaS includes a wiper module

Anubis RaaS now includes a wiper module, permanently deleting files. Active since Dec 2024, it launched an affiliate program in Feb 2025. Anubis is a new RaaS that combines... Read more »

New Predator spyware infrastructure revealed activity in Mozambique for the first time

Insik Group analyzed the new Predator spyware infrastructure and discovered it’s still gaining users despite U.S. sanctions since July 2023. Despite earlier declines in activity due to U.S. sanctions... Read more »

What is HMAC (Hash-Based Message Authentication Code)?

Hash-based message authentication code (HMAC) is a message encryption method that uses a cryptographic key with a hash function. Read more »

What is a compliance audit? (With an example checklist)

A compliance audit is critical for finding any potential compliance gaps in an organization’s operations. Here’s what companies can do to prepare for them. Read more »

Why banks’ tech-first approach leaves governance gaps

In this Help Net Security interview, Rich Friedberg, CISO at Live Oak Bank, discusses how banks can better align cybersecurity efforts with broader cyber governance and risk priorities. Banking... Read more »
Subscribe to our Newsletter