Please turn on your JavaScript for this page to function normally.
compliance security
The compliance illusion: Why your company might be at risk despite passing audits

For many CISOs, compliance can feel like a necessary evil and a false sense of security. While frameworks like ISO 27001, SOC 2, and PCI DSS offer structured guidelines, they …

Dalfox
Dalfox: Open-source XSS scanner

DalFox is an open-source tool for automating the detection of XSS vulnerabilities. With powerful testing capabilities and a wide range of features, it makes scanning, …

data breach
Background check, drug testing provider DISA suffers data breach

DISA Global Solutions, a Texas-based company that provides employment screening services (including drug and alcohol testing and background checks) for over 55,000 …

malware
China-based Silver Fox spoofs healthcare app to deliver malware

Silver Fox, a China-based threat actor that may or may not be backed by the Chinese government, has been delivering the ValleyRAT backdoor to unsuspecting users by disguising …

leaders
Cybersecurity needs a leader, so let’s stop debating and start deciding

Have you ever heard anyone earnestly ask in a business, “Who owns legal?” or “Who sets the financial strategy?” Probably not – it should be obvious, right? Yet, when it comes …

Nextcloud
Open source strikes back: Nextcloud Hub 10 challenges Big Tech’s monopoly on AI and privacy

Hyperscalers have perpetuated the narrative that open-source solutions cannot compete at scale. This perception has influenced funding priorities, shaped policy discussions, …

Marina Segal
Avoiding vendor lock-in when using managed cloud security services

In this Help Net Security interview, Marina Segal, CEO at Tamnoon, discusses the most significant obstacles when implementing managed cloud security in hybrid and multi-cloud …

risk
The CISO’s dilemma of protecting the enterprise while driving innovation

CISOs are constantly navigating the challenge of protecting their organizations while ensuring business agility and innovation. For example, as companies move workloads to the …

cybersecurity jobs
Cybersecurity jobs available right now: February 25, 2025

Application Security Engineer Binance | UAE | Remote – No longer accepting applications As a Application Security Engineer, you will enhance and maintain the security …

Ivanti
PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)

A proof-of-concept (PoC) exploit for four critical Ivanti Endpoint Manager vulnerabilities has been released by Horizon3.ai researchers. The vulnerabilities – …

Microsoft
Massive botnet hits Microsoft 365 accounts

A recently discovered botnet of over 130,000 compromised devices is launching coordinated password-spraying attacks against Microsoft 365 (M365) accounts. Security researchers …

account takeover
Account takeover detection: There’s no single tell

Account takeover (ATO) is one of the most prevalent attack types; Proofpoint says that in 2024, 99% of the customer tenants the company monitors were hit with at least one …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools