Please turn on your JavaScript for this page to function normally.
malware
Malvertising on steroids serves Lumma infostealer

A large-scale malvertising campaign distributing the Lumma infostealer malware via intrusive “ads” leading to fake CAPTCHA pages has been tied by researchers to a …

Kali Linux 2024.4
Kali Linux 2024.4 released! 14 new shiny tools added

Kali Linux 2024.4 includes a broad set of updates and changes. The summary of the changelog since the 2024.3 release from September: Python 3.12 – New default Python …

predictions
The shifting security landscape: 2025 predictions and challenges

As the borderless threat ecosystem poses new challenges for companies and governments worldwide, CISA’s 2025-2026 International Plan aims to address this problem. CISA’s …

Jennifer White
Balancing security and user experience to improve fraud prevention strategies

In this Help Net Security interview, Jennifer White, Senior Director for Banking and Payments Intelligence at J.D. Power, discusses how financial institutions can improve …

cybersecurity jobs
Cybersecurity jobs available right now: December 17, 2024

Some of the jobs listed here are no longer accepting applications. For a fresh list of open cybersecurity jobs, go here. CISO ONE Security | Israel | Hybrid – No longer …

mobile spyware
Serbian government used Cellebrite to unlock phones, install spyware

Serbian police and intelligence officers used Cellebrite forensic extraction software to unlock journalists’ and activists’ phones and install previously unknown …

cyber threat
MUT-1244 targeting security researchers, red teamers, and threat actors

A threat actor tracked as MUT-1244 by DataDog researchers has been targeting academics, pentesters, red teamers, security researchers, as well as other threat actors, in order …

malware
Evasive Node.js loader masquerading as game hack

Malware peddlers are using NodeLoader, a loader written in Node.js, to foil security solutions and deliver infostealers and cryptominers to gamers. The malicious links in …

cyber resilience
With DORA approaching, financial institutions must strengthen their cyber resilience

The clock is ticking for financial institutions across the EU as the January 17, 2025, deadline for the Digital Operational Resilience Act (DORA) approaches. This regulation …

Emre Kazim
How companies can address bias and privacy challenges in AI models

In this Help Net Security interview, Emre Kazim, Co-CEO of Holistic AI, discusses the need for companies to integrate responsible AI practices into their business strategies …

Trapster Community: Open-source, low-interaction honeypot

Trapster Community is an open-source, lightweight, low-interaction honeypot designed for deployment within internal networks. It enhances network security by creating a …

security
Overlooking platform security weakens long-term cybersecurity posture

Platform security – securing the hardware and firmware of PCs, laptops and printers – is often overlooked, weakening cybersecurity posture for years to come, according to HP. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools