date / Author
source
title
short description
technology and tools,mobile security
1/6/2026 Anamarija Pogorelec
Product showcase: Blokada for Android gives users control over network traffic
Blokada is a network privacy and ad-blocking application available on Android, iOS, Windows, macOS, and Linux. It is designed to reduce ads, block trackers, and limit unwanted network connections at the system level. Getting started Blokada’s interface is simple. A single toggle enables or disables protection, while advanced options remain available for users who want more control. The app includes usage statistics, connection logs, and per-app settings, allowing users to exclude specific apps from filtering … More →
The post Product showcase: Blokada for Android gives users control over network traffic appeared first on Help Net Security.
attacks and breaches,vulnerabilities and exploits
1/5/2026 Ionut Arghire
Sedgwick Confirms Cyberattack on Government Subsidiary
Hackers have compromised a file transfer system at Sedgwick’s subsidiary that serves government agencies.
The post Sedgwick Confirms Cyberattack on Government Subsidiary appeared first on SecurityWeek.
technology and tools
1/5/2026 Deeba Ahmed
Researchers Warn of Data Exposure Risks in Claude Chrome Extension
Security experts at Zenity Labs warn that Anthropic’s new agentic browser extension, Claude in Chrome, could bypass traditional web security, exposing private data and login tokens to potential hijackers.
vulnerabilities and exploits
1/5/2026 Ionut Arghire
CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 Entries
With 24 new vulnerabilities known to be exploited by ransomware groups, the list now includes 1,484 software and hardware flaws.
The post CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 Entries appeared first on SecurityWeek.
attacks and breaches,vulnerabilities and exploits,technology and tools
1/5/2026 Rahul Gupta
How To Build Ransomware-Resilient AI Data Pipelines: A Practical Guide for Modern Enterprises
Modern enterprises depend on AI data pipelines for analytics and automated decision-making. As these pipelines become more integrated…
vulnerabilities and exploits
1/5/2026 Eduard Kovacs
Researcher Spotlights WhatsApp Metadata Leak as Meta Begins Rolling Out Fixes
WhatsApp device fingerprinting can be useful in the delivery of sophisticated spyware, but impact is very limited without a zero-day.
The post Researcher Spotlights WhatsApp Metadata Leak as Meta Begins Rolling Out Fixes appeared first on SecurityWeek.
protection
1/5/2026 Sinisa Markovic
OpenAEV: Open-source adversarial exposure validation platform
OpenAEV is an open source platform designed to plan, run, and review cyber adversary simulation campaigns used by security teams. The project focuses on organizing exercises that blend technical actions with operational and human response elements, all managed through a single system. Scenarios as the foundation At the core of OpenAEV is the concept of a scenario. A scenario defines a threat context and turns it into a structured plan made up of events called … More →
The post OpenAEV: Open-source adversarial exposure validation platform appeared first on Help Net Security.
protection
1/5/2026 Help Net Security
Understanding AI insider risk before it becomes a problem
In this Help Net Security video, Greg Pollock, Head of Research and Insights at UpGuard, discusses AI use inside organizations and the risks tied to insiders. He explains two problems. One involves employees who use AI tools to speed up work but share data with unapproved services. The other involves hostile actors who use AI to gain trusted roles inside companies. Pollock walks through research showing how common unapproved AI use has become, including among … More →
The post Understanding AI insider risk before it becomes a problem appeared first on Help Net Security.
attacks and breaches
1/5/2026 Waqas
Researcher Wipes White Supremacist Dating Sites, Leaks Data on okstupid.lol
Security researcher in "Martha Root" in Pink Power Ranger deletes white supremacist dating sites live onstage, leaks 8,000 profiles and 100GB of data at Chaos Communication Congress (CCC) 2025.
laws, regulations and policies
1/3/2026 Associated Press
President Trump Orders Divestment in $2.9 Million Chips Deal to Protect US Security Interests
The deal involved aerospace and defense specialist Emcore Corp. selling its computer chips and wafer fabrication operation.
The post President Trump Orders Divestment in $2.9 Million Chips Deal to Protect US Security Interests appeared first on SecurityWeek.
mobile security,attacks and breaches
1/2/2026 BrianKrebs
The Kimwolf Botnet is Stalking Your Local Network
The story you are reading is a series of scoops nestled inside a far more urgent Internet-wide security advisory. The vulnerability at issue has been exploited for months already, and it's time for a broader awareness of the threat. The short version is that everything you thought you knew about the security of the internal network behind your Internet router probably is now dangerously out of date.
vulnerabilities and exploits
1/2/2026 Eduard Kovacs
Two US Cybersecurity Pros Plead Guilty Over Ransomware Attacks
Ryan Goldberg and Kevin Martin have admitted being affiliates of the BlackCat/Alphv ransomware group.
The post Two US Cybersecurity Pros Plead Guilty Over Ransomware Attacks appeared first on SecurityWeek.
vulnerabilities and exploits
1/2/2026 Ionut Arghire
RondoDox Botnet Exploiting React2Shell Vulnerability
In December, the botnet’s operators focused on weaponizing the flaw to compromise vulnerable Next.js servers.
The post RondoDox Botnet Exploiting React2Shell Vulnerability appeared first on SecurityWeek.
attacks and breaches,vulnerabilities and exploits
1/2/2026 Eduard Kovacs
Covenant Health Data Breach Impacts 478,000 Individuals
The Qilin ransomware group hacked the healthcare organization and stole data from its systems in May 2025.
The post Covenant Health Data Breach Impacts 478,000 Individuals appeared first on SecurityWeek.
vulnerabilities and exploits
1/2/2026 Ionut Arghire
Adobe ColdFusion Servers Targeted in Coordinated Campaign
GreyNoise has observed thousands of requests targeting a dozen vulnerabilities in Adobe ColdFusion during the Christmas 2025 holiday.
The post Adobe ColdFusion Servers Targeted in Coordinated Campaign appeared first on SecurityWeek.
attacks and breaches,vulnerabilities and exploits
12/31/2025 Deeba Ahmed
2 US Cybersecurity Experts Guilty of Extortion Scheme for ALPHV Ransomware
Can you trust your cybersecurity team? A recent federal case reveals how two US-based cybersecurity experts turned into affiliates for the BlackCat ransomware group, extorting over $1.2M in Bitcoin. Read the full story on their 2023 crime spree.
attacks and breaches
12/31/2025 Eduard Kovacs
European Space Agency Confirms Breach After Hacker Offers to Sell Data
The European Space Agency is conducting an investigation and says external science servers have been compromised.
The post European Space Agency Confirms Breach After Hacker Offers to Sell Data appeared first on SecurityWeek.
attacks and breaches,vulnerabilities and exploits
12/31/2025 Deeba Ahmed
30,000 Korean Air Employee Records Stolen as Cl0p Leaks Data Online
Korean Air confirms a major data leak affecting 30,000 staff members after the Cl0p gang targeted a catering partner. Learn what data was stolen and the airline’s response to secure its data.
laws, regulations and policies,protection
12/31/2025 Anamarija Pogorelec
What consumers expect from data security
Security teams spend years building controls around data protection, then a survey asks consumers a simple question about responsibility and the answer lands close to home. Most people believe they are in charge of their own data privacy, and they want systems that support that belief, according to the 2025 Data Privacy Research from the Software & Information Industry Association. The study examines how people view responsibility, cost, and acceptable data use. Personal agency shapes … More →
The post What consumers expect from data security appeared first on Help Net Security.
technology and tools
12/31/2025 Sinisa Markovic
Illegal streaming grew into an organized, profitable, and dangerous industry
Rising streaming prices are pushing more viewers toward illegal options. Movies, TV shows, and live sports are now spread across multiple platforms, and keeping up with all of them is expensive. When something is easy to access, works smoothly, and feels low risk, people adopt it. Over time, it stops feeling like an exception and starts feeling normal. Understanding the risks Research shows that one in ten people believe there is no risk in using … More →
The post Illegal streaming grew into an organized, profitable, and dangerous industry appeared first on Help Net Security.
vulnerabilities and exploits
12/31/2025 Sinisa Markovic
Security coverage is falling behind the way attackers behave
Cybercriminals keep tweaking their procedures, trying out new techniques, and shifting tactics across campaigns. Coverage that worked yesterday may miss how those behaviors appear today. The 2025 Threat-Led Defense Report from Tidal Cyber draws on tens of thousands of observed techniques and procedures collected through its threat intelligence platform. The study tracks adversary activity across campaigns, sectors, and regions, then maps that activity to MITRE ATT&CK behaviors. TTP evolution shows groups adapting in place Attacker … More →
The post Security coverage is falling behind the way attackers behave appeared first on Help Net Security.
vulnerabilities and exploits
12/31/2025 Anamarija Pogorelec
Ransomware’s new playbook is chaos
Ransomware threats are accelerating in scale, sophistication, and impact. Data reveals how evolving techniques, shifting payment trends, and AI-driven capabilities are reshaping the threat landscape, and raising the stakes for every organization. The weekend is prime time for ransomware Over half of organizations that experienced a ransomware event in the past year were hit during a weekend or holiday, according to a Semperis reportion, and fewer eyes on identity systems. Intruders know that reduced attention … More →
The post Ransomware’s new playbook is chaos appeared first on Help Net Security.
attacks and breaches,technology and tools,vulnerabilities and exploits
12/30/2025 Deeba Ahmed
HoneyMyte (aka Mustang Panda) Deploys ToneShell Backdoor in New Attacks
HoneyMyte (Mustang Panda) is back with a new ToneShell backdoor. Read how this stealthy attack blinds Microsoft Defender to target government entities in Asia.
vulnerabilities and exploits,attacks and breaches
12/30/2025 Deeba Ahmed
EmEditor Homepage Download Button Served Malware for 4 Days
Warning for EmEditor users: A third-party breach tampered with the official download link between Dec 19–22, 2025. Learn how to identify the fake installer and protect your data from infostealer malware.
vulnerabilities and exploits
12/30/2025 Ionut Arghire
Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit
The threat actor uses a signed driver file containing two user-mode shellcodes to execute its ToneShell backdoor.
The post Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit appeared first on SecurityWeek.
mobile security
12/30/2025 Anamarija Pogorelec
Product showcase: RoboForm password manager for iOS
RoboForm is a password manager that helps users store and manage login credentials, identities, and other sensitive information in one place. The app is available on macOS, Windows, Android, and iOS. It uses AES-256-bit encryption and a master password to protect stored data. RoboForm includes tools such as a password generator and form filler that reduce repetitive typing and simplify access to accounts across websites and apps. First time use on iOS RoboForm is available … More →
The post Product showcase: RoboForm password manager for iOS appeared first on Help Net Security.
protection,technology and tools
12/30/2025 Anamarija Pogorelec
Security teams debate how much to trust AI
AI is reshaping how organizations operate, defend systems, and interpret risk. Reports reveal rising AI-driven attacks, hidden usage across enterprises, and widening gaps between innovation and security readiness. As adoption accelerates, companies face pressure to govern AI responsibly while preparing for threats that move faster than current defenses. Attackers keep finding new ways to fool AI Across the AI ecosystem, developers are adopting layered controls throughout the lifecycle. They combine training safeguards, deployment filters, and … More →
The post Security teams debate how much to trust AI appeared first on Help Net Security.
attacks and breaches,technology and tools
12/29/2025 Deeba Ahmed
New Google-Themed Phishing Wave Hits Over 3,000 Global Organisations
Check Point researchers found a phishing scam abusing Google Cloud to target organisations worldwide. Scammers use official domains to steal logins. Read the full details in this exclusive report.
attacks and breaches
12/29/2025 Deeba Ahmed
Ubisoft Shuts Down Rainbow Six Siege After MongoDB Exploit Hits Players
Over 87,000 MongoDB instances are at risk from a critical memory leak called MongoBleed. Following the chaos at Ubisoft, see how this zero-password flaw works and how to protect your data.
attacks and breaches
12/29/2025 Eduard Kovacs
Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000
It took Sax well over a year to complete its investigation after detecting hackers on its network.
The post Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000 appeared first on SecurityWeek.
vulnerabilities and exploits
12/29/2025 Ionut Arghire
Fortinet Warns of New Attacks Exploiting Old Vulnerability
Tracked as CVE-2020-12812, the exploited FortiOS flaw allows threat actors to bypass two-factor authentication.
The post Fortinet Warns of New Attacks Exploiting Old Vulnerability appeared first on SecurityWeek.
attacks and breaches
12/29/2025 Ionut Arghire
Coupang to Issue $1.17 Billion in Vouchers Over Data Breach
The ecommerce giant will provide purchase vouchers to the 33.7 million individuals impacted by the incident.
The post Coupang to Issue $1.17 Billion in Vouchers Over Data Breach appeared first on SecurityWeek.
attacks and breaches
12/29/2025 Ionut Arghire
22 Million Affected by Aflac Data Breach
Hackers stole names, addresses, Social Security numbers, ID numbers, and medical and health insurance information from Aflac’s systems.
The post 22 Million Affected by Aflac Data Breach appeared first on SecurityWeek.
vulnerabilities and exploits
12/29/2025 Eduard Kovacs
Infostealer Malware Delivered in EmEditor Supply Chain Attack
The ‘download’ button on the official EmEditor website served a malicious installer.
The post Infostealer Malware Delivered in EmEditor Supply Chain Attack appeared first on SecurityWeek.
vulnerabilities and exploits
12/29/2025 Ionut Arghire
Fresh MongoDB Vulnerability Exploited in Attacks
Dubbed MongoBleed, the high-severity flaw allows unauthenticated, remote attackers to leak sensitive information from MongoDB servers.
The post Fresh MongoDB Vulnerability Exploited in Attacks appeared first on SecurityWeek.
attacks and breaches
12/29/2025 Eduard Kovacs
Hacker Claims Theft of 40 Million Condé Nast Records After Wired Data Leak
A hacker named Lovely made public 2.3 million records representing Wired subscriber information.
The post Hacker Claims Theft of 40 Million Condé Nast Records After Wired Data Leak appeared first on SecurityWeek.