Please turn on your JavaScript for this page to function normally.
North Korea
With AI’s help, North Korean hackers stumbled into a near-undetectable attack

For many years, state-sponsored hacking was defined by human expertise in finding security holes, writing malware and exploits, pulling off social engineering and phishing …

arrested
Hacker with a special interest in breaching sports institutions ends behind bars

French police have arrested a suspected hacker linked to a series of data breaches affecting organizations in the country. Citing authorities, Le Parisien reported that the …

Android
Google brings instant email verification to Android, no OTP needed

Google has introduced cryptographically verified email credentials for Android through the Credential Manager API. This API aligns with the W3C Digital Credential API …

hardware
If cyber espionage via HDMI worries you, NCSC built a device to stop it

A new cybersecurity device developed by the National Cyber Security Centre (NCSC) should be a helpful solution for protecting governments and businesses from malicious …

Apple
Apple fixes iPhone bug that let FBI retrieve deleted Signal messages(CVE-2026-28950)

Apple has rolled out security updates for iPhones and iPads that fix CVE-2026-28950, a logging issue in Notification Services that made devices unexpectedly retain …

danger
GopherWhisper APT group hides command and control traffic in Slack and Discord

Attackers continue to lean on everyday collaboration platforms to hide command and control traffic inside normal enterprise noise. A newly identified China-aligned APT group …

OpenAI
OpenAI tackles a bad habit people have when interacting with AI

Since people tend to paste personal data into AI tools such as ChatGPT, OpenAI has released Privacy Filter, an open-weight model designed to detect and redact personally …

Sandra McLeod
A year in, Zoom’s CISO reflects on balancing security and business

In this Help Net Security interview, Sandra McLeod, CISO at Zoom, reflects on her first year in the role. She talks about moving from reactive firefighting to business …

Scenario
Scenario: Open-source framework for automated AI app red-teaming

Enterprises running customer service bots, data analytics agents, and other AI-driven applications in production handle sensitive records and connect to core business systems …

Europe
GDPR works, but only where someone enforces it

A new measurement study of web tracking across ten countries offers a reality check for anyone working on privacy compliance. Researchers crawled the same set of globally …

person
Ransomware, fraud, and lawsuits drive cyber insurance claims to new peaks

The 2026 InsurSec Report from At-Bay, covering more than 100,000 policy years of claims data, documents a 7% year-over-year rise in overall claim frequency and an all-time …

Google Workspace Intelligence
Google’s Workspace Intelligence promises privacy while running on your data

Security and data governance are among the key considerations in Google’s latest AI update, which introduces Workspace Intelligence within Google Workspace. Google describes …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools