Please turn on your JavaScript for this page to function normally.
Fortinet
Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)

With two proof-of-concept (PoC) exploits made public late last week, CVE-2025-25257 – a critical SQL command injection vulnerability in Fortinet’s FortiWeb web …

Gail Hodges
FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare

In this Help Net Security interview, Gail Hodges, Executive Director at the OpenID Foundation, discusses how the Foundation ensures global consistency in FAPI 2.0 …

pqcscan
pqcscan: Open-source post-quantum cryptography scanner

pqcscan is an open-source tool that lets users scan SSH and TLS servers to see which Post-Quantum Cryptography (PQC) algorithms they claim to support. It saves the results in …

Bitdefender
Bitdefender PHASR: Proactive hardening demo overview

Discover how Bitdefender PHASR enables organizations to identify and remediate security misconfigurations before attackers can exploit them. This demo walks through PHASR’s …

Microsoft 365
Why your Microsoft 365 setup might be more vulnerable than you think

60% of organizations rate their Microsoft 365 security as “established” or “advanced”, according to CoreView. Yet, 60% of those same organizations have experienced account …

Biohazard
Ransomware drops, but don’t relax yet

WatchGuard has released its latest Internet Security Report, covering malware, network, and endpoint threats spotted by its Threat Lab in the first quarter of 2025. The report …

AI agent
Legal gaps in AI are a business risk, not just a compliance issue

A new report from Zendesk outlines a growing problem for companies rolling out AI tools: many aren’t ready to manage the risks. The AI Trust Report 2025 finds that while AI is …

week in review
Week in review: Microsoft fixes wormable RCE bug on Windows, check for CitrixBleed 2 exploitation

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft fixes critical wormable Windows flaw (CVE-2025-47981) For July 2025 …

Wing FTP Server
Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)

Threat actors are actively exploiting a recently fixed remote code execution vulnerability (CVE-2025-47812) in Wing FTP Server, security researchers have warned. Wing FTP …

software
Behind the code: How developers work in 2025

How are developers working in 2025? Docker surveyed over 4,500 people to find out, and the answers are a mix of progress and ongoing pain points. AI is gaining ground but …

Thijs Povel
Where policy meets profit: Navigating the new frontier of defense tech startups

In this Help Net Security interview, Thijs Povel, Managing Partner at Ventures.eu, discusses how the firm evaluates emerging technologies through the lens of defense and …

shadow AI
Employees are quietly bringing AI to work and leaving security behind

While IT departments race to implement AI governance frameworks, many employees have already opened a backdoor for AI, according to ManageEngine. The rise of unauthorized AI …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools