Please turn on your JavaScript for this page to function normally.
Infosec products of the week
New infosec products of the week: February 21, 2025

Here’s a look at the most interesting products from the past week, featuring releases from 1Password, Fortinet, Pangea, Privacera, and Veeam Software. Fortinet enhances …

cybersecurity jobs usa
Cybersecurity jobs available right now in the USA: February 20, 2025

Cybersecurity Analyst Messer | On-site – No longer accepting applications As a Cybersecurity Analyst, you will utilize existing technology platforms to monitor security …

PRevent
PRevent: Open-source tool to detect malicious code in pull requests

Apiiro security researchers have released open source tools that can help organizations detect malicious code as part of their software development lifecycle: PRevent (a …

phishing kits
Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand

A new, improved version of Darcula, a cat-themed phishing-as-a-service (PhaaS) platform aimed at serving Chinese-speaking criminals, will be released this month and will allow …

cybercrime
Hackers pose as employers to steal crypto, login credentials

Since early 2024, ESET researchers have been tracking DeceptiveDevelopment, a series of malicious campaigns linked to North Korea-aligned operators. Disguising themselves as …

Juliette Hudson
Unknown and unsecured: The risks of poor asset visibility

In this Help Net Security interview, Juliette Hudson, CTO of CybaVerse, discusses why asset visibility remains a critical cybersecurity challenge. She explains how to maintain …

malware
300% increase in endpoint malware detections

The third quarter of 2024 saw a dramatic shift in the types of malware detected at network perimeters, according to a new WatchGuard report. The report’s key findings include …

iOS 18
iOS 18 settings to lock down your privacy and security

Enhancing your security and privacy on iOS 18 involves configuring various settings to control access to your personal data and device features. Here are 12 essential settings …

Palo Alto Networks
Attackers are chaining flaws to breach Palo Alto Networks firewalls

Exploitation attempts targeting CVE-2025-0108, a recently disclosed authentication bypass vulnerability affecting the management web interface of Palo Alto Networks’ …

Kunai
Kunai: Open-source threat hunting tool for Linux

Kunai is an open-source tool that provides deep and precise event monitoring for Linux environments. “What sets Kunai apart is its ability to go beyond simple event …

cyber hygiene habits
Cyber hygiene habits that many still ignore

Cybersecurity advice is everywhere. We’re constantly reminded to update our passwords, enable two-factor authentication, and avoid clicking suspicious links. Yet, beneath …

ransomware
BlackLock ransomware onslaught: What to expect and how to fight it

BlackLock is on track to become the most active ransomware-as-a-service (RaaS) outfit in 2025, according to ReliaQuest. Its success is primarily due to their unusually active …

Don't miss

Cybersecurity news