Security News

Outsmarting Cyber Threats with Attack Graphs
2025-03-06 12:14

Cyber threats are growing more sophisticated, and traditional security approaches struggle to keep up. Organizations can no longer rely on periodic assessments or static vulnerability lists to...

So … Russia no longer a cyber threat to America?
2025-03-04 02:15

Mixed messages from Pentagon, CISA as Trump gets pally with Putin and Kremlin strikes US critical networks Comment America's cybersecurity chiefs in recent days have been sending mixed messages...

DHS says CISA will not stop monitoring Russian cyber threats
2025-03-03 19:22

The US Cybersecurity and Infrastructure Security Agency says that media reports about it being directed to no longer follow or report on Russian cyber activity are untrue, and its mission remains...

OT/ICS cyber threats escalate as geopolitical conflicts intensify
2025-02-28 15:00

Ransomware attacks against industrial organizations surged by 87% over the past year, while new malware families designed specifically for OT environments emerged. These findings highlight a...

SonicWall Report: “Threat Actors are Moving at Unprecedented Speeds”
2025-02-26 19:36

SonicWall’s 2025 Annual Threat Report noted the U.S. healthcare sector and Latin America were targeted by cybercriminals.

Google Cloud KMS Adds Quantum-Safe Digital Signatures to Defend Against Future Threats
2025-02-24 11:17

Google Cloud has announced quantum-safe digital signatures in Google Cloud Key Management Service (Cloud KMS) for software-based keys as a way to bulletproof encryption systems against the threat...

Man vs. machine: Striking the perfect balance in threat intelligence
2025-02-24 06:00

In this Help Net Security interview, Aaron Roberts, Director at Perspective Intelligence, discusses how automation is reshaping threat intelligence. He explains that while AI tools can process...

Kunai: Open-source threat hunting tool for Linux
2025-02-19 06:00

Kunai is an open-source tool that provides deep and precise event monitoring for Linux environments. “What sets Kunai apart is its ability to go beyond simple event generation. While most security...

Threat actors are using legitimate Microsoft feature to compromise M365 accounts
2025-02-14 14:16

Suspected Russian threat actors have been taking advantage of Microsoft Device Code Authentication to trick targets into granting them access to their Microsoft 365 (M365) accounts. “While Device...

Inconsistent security strategies fuel third-party threats
2025-02-14 04:30

47% of organizations have experienced a data breach or cyberattack over the past 12 months that involved a third-party accessing their network, according to Imprivata and the Ponemon Institute....