top of page

date / Author

source

title

short description

Read

technology and tools,mobile security

1/6/2026 Anamarija Pogorelec

Product showcase: Blokada for Android gives users control over network traffic

Blokada is a network privacy and ad-blocking application available on Android, iOS, Windows, macOS, and Linux. It is designed to reduce ads, block trackers, and limit unwanted network connections at the system level. Getting started Blokada’s interface is simple. A single toggle enables or disables protection, while advanced options remain available for users who want more control. The app includes usage statistics, connection logs, and per-app settings, allowing users to exclude specific apps from filtering … More →
The post Product showcase: Blokada for Android gives users control over network traffic appeared first on Help Net Security.

attacks and breaches

1/5/2026 Ionut Arghire

Brightspeed Investigating Cyberattack

The hacking group Crimson Collective has claimed the theft of personal information pertaining to over 1 million Brightspeed customers.
The post Brightspeed Investigating Cyberattack appeared first on SecurityWeek.

attacks and breaches,vulnerabilities and exploits

1/5/2026 Ionut Arghire

Sedgwick Confirms Cyberattack on Government Subsidiary

Hackers have compromised a file transfer system at Sedgwick’s subsidiary that serves government agencies.
The post Sedgwick Confirms Cyberattack on Government Subsidiary appeared first on SecurityWeek.

technology and tools

1/5/2026 Deeba Ahmed

Researchers Warn of Data Exposure Risks in Claude Chrome Extension

Security experts at Zenity Labs warn that Anthropic’s new agentic browser extension, Claude in Chrome, could bypass traditional web security, exposing private data and login tokens to potential hijackers.

vulnerabilities and exploits

1/5/2026 Ionut Arghire

CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 Entries

With 24 new vulnerabilities known to be exploited by ransomware groups, the list now includes 1,484 software and hardware flaws.
The post CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 Entries appeared first on SecurityWeek.

attacks and breaches

1/5/2026 Waqas

NordVPN Denies Breach After Hacker Claims Access to Salesforce Dev Data

A hacker using the alias 1011 has claimed to breach a NordVPN development server, posting what appears to…

attacks and breaches,vulnerabilities and exploits,technology and tools

1/5/2026 Rahul Gupta

How To Build Ransomware-Resilient AI Data Pipelines: A Practical Guide for Modern Enterprises

Modern enterprises depend on AI data pipelines for analytics and automated decision-making. As these pipelines become more integrated…

vulnerabilities and exploits

1/5/2026 Eduard Kovacs

Researcher Spotlights WhatsApp Metadata Leak as Meta Begins Rolling Out Fixes

WhatsApp device fingerprinting can be useful in the delivery of sophisticated spyware, but impact is very limited without a zero-day.
The post Researcher Spotlights WhatsApp Metadata Leak as Meta Begins Rolling Out Fixes appeared first on SecurityWeek.

laws, regulations and policies

1/5/2026 Deeba Ahmed

Disney Fined $10M for Violating Children’s Privacy Laws on YouTube

Disney agrees to a $10M settlement with the DOJ and FTC over YouTube privacy violations. Learn how the COPPA ruling affects kids' data and Disney's new rules.

protection

1/5/2026 Sinisa Markovic

OpenAEV: Open-source adversarial exposure validation platform

OpenAEV is an open source platform designed to plan, run, and review cyber adversary simulation campaigns used by security teams. The project focuses on organizing exercises that blend technical actions with operational and human response elements, all managed through a single system. Scenarios as the foundation At the core of OpenAEV is the concept of a scenario. A scenario defines a threat context and turns it into a structured plan made up of events called … More →
The post OpenAEV: Open-source adversarial exposure validation platform appeared first on Help Net Security.

protection

1/5/2026 Help Net Security

Understanding AI insider risk before it becomes a problem

In this Help Net Security video, Greg Pollock, Head of Research and Insights at UpGuard, discusses AI use inside organizations and the risks tied to insiders. He explains two problems. One involves employees who use AI tools to speed up work but share data with unapproved services. The other involves hostile actors who use AI to gain trusted roles inside companies. Pollock walks through research showing how common unapproved AI use has become, including among … More →
The post Understanding AI insider risk before it becomes a problem appeared first on Help Net Security.

attacks and breaches

1/5/2026 Waqas

Researcher Wipes White Supremacist Dating Sites, Leaks Data on okstupid.lol

Security researcher in "Martha Root" in Pink Power Ranger deletes white supremacist dating sites live onstage, leaks 8,000 profiles and 100GB of data at Chaos Communication Congress (CCC) 2025.

attacks and breaches

1/3/2026 Waqas

Resecurity Says ShinyHunters Fell for Honeypot After Breach Claim

Resecurity denies breach claims by ShinyHunters, says attackers accessed a honeypot with fake data. No real systems or customer info were compromised.

attacks and breaches

1/3/2026 Waqas

ShinyHunters Claim Breach of US Cybersecurity Firm Resecurity

The hacking group ShinyHunters has claimed responsibility for breaching Resecurity, a US-based cybersecurity company headquartered in Los Angeles.…

attacks and breaches,vulnerabilities and exploits

1/3/2026 Deeba Ahmed

RondoDox Botnet is Using React2Shell to Hijack Thousands of Unpatched Devices

RondoDox hackers exploit the React2Shell flaw in Next.js to target 90,000+ devices, including routers, smart cameras, and small business websites.

laws, regulations and policies

1/3/2026 Associated Press

President Trump Orders Divestment in $2.9 Million Chips Deal to Protect US Security Interests

The deal involved aerospace and defense specialist Emcore Corp. selling its computer chips and wafer fabrication operation.
The post President Trump Orders Divestment in $2.9 Million Chips Deal to Protect US Security Interests appeared first on SecurityWeek.

technology and tools

1/2/2026 Owais Sultan

Protecting Your Digital Wallet: What You Need to Know About Fintech Security

The world of finance has undergone a remarkable transformation with the rise of digital wallets and financial technology…

attacks and breaches

1/2/2026 Deeba Ahmed

Tokyo FM Data Breach: Hacker Claims Over 3 Million Records Stolen

Tokyo FM is investigating claims of a massive data breach involving 3 million records. Learn what information was allegedly taken and how you can stay safe.

mobile security,attacks and breaches

1/2/2026 BrianKrebs

The Kimwolf Botnet is Stalking Your Local Network

The story you are reading is a series of scoops nestled inside a far more urgent Internet-wide security advisory. The vulnerability at issue has been exploited for months already, and it's time for a broader awareness of the threat. The short version is that everything you thought you knew about the security of the internal network behind your Internet router probably is now dangerously out of date.

vulnerabilities and exploits

1/2/2026 Eduard Kovacs

Two US Cybersecurity Pros Plead Guilty Over Ransomware Attacks

Ryan Goldberg and Kevin Martin have admitted being affiliates of the BlackCat/Alphv ransomware group.
The post Two US Cybersecurity Pros Plead Guilty Over Ransomware Attacks appeared first on SecurityWeek.

vulnerabilities and exploits

1/2/2026 Ionut Arghire

RondoDox Botnet Exploiting React2Shell Vulnerability

In December, the botnet’s operators focused on weaponizing the flaw to compromise vulnerable Next.js servers.
The post RondoDox Botnet Exploiting React2Shell Vulnerability appeared first on SecurityWeek.

attacks and breaches,vulnerabilities and exploits

1/2/2026 Eduard Kovacs

Covenant Health Data Breach Impacts 478,000 Individuals

The Qilin ransomware group hacked the healthcare organization and stole data from its systems in May 2025. 
The post Covenant Health Data Breach Impacts 478,000 Individuals appeared first on SecurityWeek.

vulnerabilities and exploits

1/2/2026 Ionut Arghire

Adobe ColdFusion Servers Targeted in Coordinated Campaign

GreyNoise has observed thousands of requests targeting a dozen vulnerabilities in Adobe ColdFusion during the Christmas 2025 holiday.
The post Adobe ColdFusion Servers Targeted in Coordinated Campaign appeared first on SecurityWeek.

technology and tools

1/1/2026 Owais Sultan

How Webflow Helps Companies Move Faster Without Sacrificing Brand Control

Conventional development frequently results in a trade-off between speed and brand consistency, which harms reputation by causing delays…

attacks and breaches

12/31/2025 Waqas

Hacker Claims European Space Agency Breach, Selling 200GB of Data

A hacker using the alias 888 is claiming responsibility for a major data breach affecting the European Space…

attacks and breaches,vulnerabilities and exploits

12/31/2025 Waqas

Everest Ransomware Leaks 1TB of Stolen ASUS Data

On December 2, 2025, Hackread.com exclusively reported that the Everest ransomware group claimed to have stolen 1TB of…

attacks and breaches,vulnerabilities and exploits

12/31/2025 Deeba Ahmed

2 US Cybersecurity Experts Guilty of Extortion Scheme for ALPHV Ransomware

Can you trust your cybersecurity team? A recent federal case reveals how two US-based cybersecurity experts turned into affiliates for the BlackCat ransomware group, extorting over $1.2M in Bitcoin. Read the full story on their 2023 crime spree.

attacks and breaches

12/31/2025 Eduard Kovacs

European Space Agency Confirms Breach After Hacker Offers to Sell Data

The European Space Agency is conducting an investigation and says external science servers have been compromised.
The post European Space Agency Confirms Breach After Hacker Offers to Sell Data appeared first on SecurityWeek.

attacks and breaches,vulnerabilities and exploits

12/31/2025 Deeba Ahmed

30,000 Korean Air Employee Records Stolen as Cl0p Leaks Data Online

Korean Air confirms a major data leak affecting 30,000 staff members after the Cl0p gang targeted a catering partner. Learn what data was stolen and the airline’s response to secure its data.

laws, regulations and policies,protection

12/31/2025 Anamarija Pogorelec

What consumers expect from data security

Security teams spend years building controls around data protection, then a survey asks consumers a simple question about responsibility and the answer lands close to home. Most people believe they are in charge of their own data privacy, and they want systems that support that belief, according to the 2025 Data Privacy Research from the Software & Information Industry Association. The study examines how people view responsibility, cost, and acceptable data use. Personal agency shapes … More →
The post What consumers expect from data security appeared first on Help Net Security.

technology and tools

12/31/2025 Sinisa Markovic

Illegal streaming grew into an organized, profitable, and dangerous industry

Rising streaming prices are pushing more viewers toward illegal options. Movies, TV shows, and live sports are now spread across multiple platforms, and keeping up with all of them is expensive. When something is easy to access, works smoothly, and feels low risk, people adopt it. Over time, it stops feeling like an exception and starts feeling normal. Understanding the risks Research shows that one in ten people believe there is no risk in using … More →
The post Illegal streaming grew into an organized, profitable, and dangerous industry appeared first on Help Net Security.

vulnerabilities and exploits

12/31/2025 Sinisa Markovic

Security coverage is falling behind the way attackers behave

Cybercriminals keep tweaking their procedures, trying out new techniques, and shifting tactics across campaigns. Coverage that worked yesterday may miss how those behaviors appear today. The 2025 Threat-Led Defense Report from Tidal Cyber draws on tens of thousands of observed techniques and procedures collected through its threat intelligence platform. The study tracks adversary activity across campaigns, sectors, and regions, then maps that activity to MITRE ATT&CK behaviors. TTP evolution shows groups adapting in place Attacker … More →
The post Security coverage is falling behind the way attackers behave appeared first on Help Net Security.

vulnerabilities and exploits

12/31/2025 Anamarija Pogorelec

Ransomware’s new playbook is chaos

Ransomware threats are accelerating in scale, sophistication, and impact. Data reveals how evolving techniques, shifting payment trends, and AI-driven capabilities are reshaping the threat landscape, and raising the stakes for every organization. The weekend is prime time for ransomware Over half of organizations that experienced a ransomware event in the past year were hit during a weekend or holiday, according to a Semperis reportion, and fewer eyes on identity systems. Intruders know that reduced attention … More →
The post Ransomware’s new playbook is chaos appeared first on Help Net Security.

attacks and breaches,technology and tools,vulnerabilities and exploits

12/30/2025 Deeba Ahmed

HoneyMyte (aka Mustang Panda) Deploys ToneShell Backdoor in New Attacks

HoneyMyte (Mustang Panda) is back with a new ToneShell backdoor. Read how this stealthy attack blinds Microsoft Defender to target government entities in Asia.

vulnerabilities and exploits,attacks and breaches

12/30/2025 Deeba Ahmed

EmEditor Homepage Download Button Served Malware for 4 Days

Warning for EmEditor users: A third-party breach tampered with the official download link between Dec 19–22, 2025. Learn how to identify the fake installer and protect your data from infostealer malware.

vulnerabilities and exploits

12/30/2025 Ionut Arghire

Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit

The threat actor uses a signed driver file containing two user-mode shellcodes to execute its ToneShell backdoor.
The post Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit appeared first on SecurityWeek.

attacks and breaches

12/30/2025 Eduard Kovacs

Korean Air Data Compromised in Oracle EBS Hack

Roughly 30,000 Korean Air employees had their data stolen by hackers in a breach at former subsidiary KC&D.
The post Korean Air Data Compromised in Oracle EBS Hack appeared first on SecurityWeek.

mobile security

12/30/2025 Anamarija Pogorelec

Product showcase: RoboForm password manager for iOS

RoboForm is a password manager that helps users store and manage login credentials, identities, and other sensitive information in one place. The app is available on macOS, Windows, Android, and iOS. It uses AES-256-bit encryption and a master password to protect stored data. RoboForm includes tools such as a password generator and form filler that reduce repetitive typing and simplify access to accounts across websites and apps. First time use on iOS RoboForm is available … More →
The post Product showcase: RoboForm password manager for iOS appeared first on Help Net Security.

protection,technology and tools

12/30/2025 Anamarija Pogorelec

Security teams debate how much to trust AI

AI is reshaping how organizations operate, defend systems, and interpret risk. Reports reveal rising AI-driven attacks, hidden usage across enterprises, and widening gaps between innovation and security readiness. As adoption accelerates, companies face pressure to govern AI responsibly while preparing for threats that move faster than current defenses. Attackers keep finding new ways to fool AI Across the AI ecosystem, developers are adopting layered controls throughout the lifecycle. They combine training safeguards, deployment filters, and … More →
The post Security teams debate how much to trust AI appeared first on Help Net Security.

attacks and breaches,technology and tools

12/29/2025 Deeba Ahmed

New Google-Themed Phishing Wave Hits Over 3,000 Global Organisations

Check Point researchers found a phishing scam abusing Google Cloud to target organisations worldwide. Scammers use official domains to steal logins. Read the full details in this exclusive report.

attacks and breaches

12/29/2025 Owais Sultan

How to Spot the Most Common Crypto Phishing Scams

Crypto phishing scams surged 83% in 2025, targeting wallets with fake sites, approval tricks, and poisoned addresses. One click can drain your funds.

attacks and breaches

12/29/2025 Deeba Ahmed

Ubisoft Shuts Down Rainbow Six Siege After MongoDB Exploit Hits Players

Over 87,000 MongoDB instances are at risk from a critical memory leak called MongoBleed. Following the chaos at Ubisoft, see how this zero-password flaw works and how to protect your data.

attacks and breaches

12/29/2025 Eduard Kovacs

Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000

It took Sax well over a year to complete its investigation after detecting hackers on its network.
The post Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000 appeared first on SecurityWeek.

technology and tools

12/29/2025 Deeba Ahmed

Critical 0day flaw Exposes 70k XSpeeder Devices as Vendor Ignores Alert

Researchers reveal CVE-2025-54322, a critical unpatched flaw in XSpeeder networking gear found by AI agents. 70,000 industrial and branch devices are exposed.

vulnerabilities and exploits

12/29/2025 Ionut Arghire

Fortinet Warns of New Attacks Exploiting Old Vulnerability

Tracked as CVE-2020-12812, the exploited FortiOS flaw allows threat actors to bypass two-factor authentication.
The post Fortinet Warns of New Attacks Exploiting Old Vulnerability appeared first on SecurityWeek.

attacks and breaches

12/29/2025 Ionut Arghire

Coupang to Issue $1.17 Billion in Vouchers Over Data Breach

The ecommerce giant will provide purchase vouchers to the 33.7 million individuals impacted by the incident.
The post Coupang to Issue $1.17 Billion in Vouchers Over Data Breach appeared first on SecurityWeek.

attacks and breaches

12/29/2025 Ionut Arghire

22 Million Affected by Aflac Data Breach

Hackers stole names, addresses, Social Security numbers, ID numbers, and medical and health insurance information from Aflac’s systems.
The post 22 Million Affected by Aflac Data Breach appeared first on SecurityWeek.

vulnerabilities and exploits

12/29/2025 Eduard Kovacs

Infostealer Malware Delivered in EmEditor Supply Chain Attack

The ‘download’ button on the official EmEditor website served a malicious installer.
The post Infostealer Malware Delivered in EmEditor Supply Chain Attack appeared first on SecurityWeek.

vulnerabilities and exploits

12/29/2025 Ionut Arghire

Fresh MongoDB Vulnerability Exploited in Attacks

Dubbed MongoBleed, the high-severity flaw allows unauthenticated, remote attackers to leak sensitive information from MongoDB servers.
The post Fresh MongoDB Vulnerability Exploited in Attacks appeared first on SecurityWeek.

attacks and breaches

12/29/2025 Eduard Kovacs

Hacker Claims Theft of 40 Million Condé Nast Records After Wired Data Leak

A hacker named Lovely made public 2.3 million records representing Wired subscriber information.
The post Hacker Claims Theft of 40 Million Condé Nast Records After Wired Data Leak appeared first on SecurityWeek.

bottom of page