September 2025

Ongoing malvertising campaign targets European IT workers with fake GitHub Desktop installers
Researchers have spotted a malvertising (and clever malware delivery) campaign targeting IT workers in the European Union with fake GitHub Desktop installers. “We …

Connected cars are racing ahead, but security is stuck in neutral
Connected cars are already on Europe’s roads, loaded with software, sensors, and constant data connections. Drivers love the features these vehicles bring, from remote apps to …

Attackers test the limits of railway cybersecurity
Railway systems are the lifeblood of many economies, supporting everything from daily passenger transport to military and industrial operations, so the question arises: how …

Employees keep feeding AI tools secrets they can’t take back
Employees are putting sensitive data into public AI tools, and many organizations don’t have the controls to stop it. A new report from Kiteworks finds that most companies are …

Are we headed for an AI culture war?
In this Help Net Security video, Matt Fangman, Field CTO at SailPoint, discusses whether an AI culture war is inevitable. He explores the rise of AI agents as a new identity …

Cybersecurity jobs available right now: September 9, 2025
Analyst, Cybersecurity DFIR ICE | Singapore | On-site – View job details As an Analyst, Cybersecurity DFIR, you will review and triage user-reported emails to identify …

SentinelOne to acquire Observo AI, enhancing SIEM and security operations
SentinelOne has announced its intent to acquire Observo AI. The deal will serve as an immediate complement and catalyst to SentinelOne’s AI SIEM and data offerings, which are …

Salesloft Drift data breach: Investigation reveals how attackers got in
The attack that resulted in the Salesloft Drift data breach started with the compromise of the company’s GitHub account, Salesloft confirmed this weekend. Supply chain …

Linux Kernel Runtime Guard hits 1.0.0 with major updates and broader support
The Linux Kernel Runtime Guard (LKRG) is a kernel module that checks the Linux kernel while it’s running. It looks for signs of tampering and tries to catch attempts to …

Cybersecurity research is getting new ethics rules, here’s what you need to know
Top cybersecurity conferences are introducing new rules that require researchers to formally address ethics in their work. Starting with the 2026 USENIX Security Symposium, …

InterceptSuite: Open-source network traffic interception tool
InterceptSuite is an open-source, cross-platform network traffic interception tool designed for TLS/SSL inspection, analysis, and manipulation at the network level. …

Cyber defense cannot be democratized
The democratization of AI has fundamentally lowered the barrier for threat actors, creating a bigger pool of people who can carry out sophisticated attacks. The so-called …
Featured news
Resources
Don't miss
- Deepfakes are rewriting the rules of geopolitics
- Garak: Open-source LLM vulnerability scanner
- Fixing silent failures in security controls with adversarial exposure validation
- Plex tells users to change passwords due to data breach, pushes server owners to upgrade
- Fake npm 2FA reset email led to compromise of popular code packages