Aggregator
«Эй, Siri, слей все мои данные»: что на самом деле может натворить новый протокол ИИ
End-to-end encryption в режиме групповой peer-to-peer конференции — Telegram включает распределённую паранойю по умолчанию
Spellbinder: магия бокового перемещения и чары IPv6 в исполнении китайских хакеров
Why SMEs can no longer afford to ignore cyber risk
In this Help Net Security interview, Steven Furnell, Professor of Cyber Security at the University of Nottingham, illustrates how small and medium-sized businesses (SMEs) must reassess their risk exposure and prioritize resilience to safeguard their long-term growth and stability. Learn how SMEs can better protect themselves, adapt to regulations, and build stronger cyber resilience. Where do you see SMEs most vulnerable? Is it still phishing and ransomware, or are there more nuanced threats emerging? Phishing … More →
The post Why SMEs can no longer afford to ignore cyber risk appeared first on Help Net Security.
SonicWall Confirms Active Exploitation of Flaws Affecting Multiple Appliance Models
Многоступенчатый взлом: как Nebulous Mantis проникла в инфраструктуру НАТО
Commvault Confirms Zero-Day Attack Breached Its Azure Cloud Environment
Commvault, a global leader in data protection and information management, has confirmed that a sophisticated cyberattack involving a zero-day vulnerability breached its Azure cloud environment earlier this week. The breach, attributed to a suspected nation-state threat actor, underscores the evolving risks faced by cloud service providers and their clients. On February 20, 2025, Commvault was […]
The post Commvault Confirms Zero-Day Attack Breached Its Azure Cloud Environment appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Preparing for the next wave of machine identity growth
Machine identities are multiplying fast, and many organizations are struggling to keep up. In this Help Net Security interview, Wendy Wu, CMO at SailPoint, explains why machine identity security matters, where most companies go wrong, how automation can help, and what the rise of AI agents means for the future of identity management. Why has machine identity security become such a critical component of cybersecurity strategies in recent years? The simplest answer is that while … More →
The post Preparing for the next wave of machine identity growth appeared first on Help Net Security.
JVN: Lantronix製Xportにおける重要な機能に対する認証の欠如の脆弱性
FBI Uncovers 42,000 Phishing Domains Tied to LabHost PhaaS Operation
The Federal Bureau of Investigation (FBI) has revealed the existence of 42,000 phishing domains associated with the notorious LabHost phishing-as-a-service (PhaaS) platform. This operation, which spanned from November 2021 through April 2024, was recently disabled by law enforcement and had enabled cybercriminals to target millions of victims worldwide. LabHost: A Major Player in Cybercrime LabHost, […]
The post FBI Uncovers 42,000 Phishing Domains Tied to LabHost PhaaS Operation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Вложились в роботов, потеряли клиентов: Starbucks проклинает автоматизацию
Hottest cybersecurity open-source tools of the month: April 2025
This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. GoSearch: Open-source OSINT tool for uncovering digital footprints GoSearch is an open-source OSINT tool built to uncover digital footprints linked to specific usernames. Designed for speed and accuracy, it lets users quickly track someone’s online presence across multiple platforms. Hawk Eye: Open-source scanner uncovers secrets and PII across platforms Hawk Eye is an open-source tool that helps … More →
The post Hottest cybersecurity open-source tools of the month: April 2025 appeared first on Help Net Security.