Category: EN

North Korea Stole Your Job

For years, North Korea has been secretly placing young IT workers inside Western companies. With AI, their schemes are now more devious—and effective—than ever. This article has been indexed from Security Latest Read the original article: North Korea Stole Your…

TehetségKapu – 54,357 breached accounts

In March 2025, almost 55k records were breached from the Hungarian education office website TehetségKapu. The data was subsequently published to a popular hacking forum and included email addresses, names and usernames. This article has been indexed from Have I…

Preparing for the next wave of machine identity growth

Machine identities are multiplying fast, and many organizations are struggling to keep up. In this Help Net Security interview, Wendy Wu, CMO at SailPoint, explains why machine identity security matters, where most companies go wrong, how automation can help, and…

Why SMEs can no longer afford to ignore cyber risk

In this Help Net Security interview, Steven Furnell, Professor of Cyber Security at the University of Nottingham, illustrates how small and medium-sized businesses (SMEs) must reassess their risk exposure and prioritize resilience to safeguard their long-term growth and stability. Learn…

Cyber Attack on British Co-Operative Group

The Co-Operative Group, commonly known as Co-Op, has issued an official statement confirming that some of its systems were recently targeted in a cyber attack. The retailer, which operates in a variety of sectors including food retail, funeral services, and…

SonicWall OS Command Injection Vulnerability Exploited in the Wild

SonicWall has issued an urgent warning to customers that threat actors are actively exploiting a high-severity command injection vulnerability in its Secure Mobile Access (SMA) appliances. The vulnerability, tracked as CVE-2023-44221, was initially disclosed in December 2023 but has recently…

Hijacking NodeJS’ Jenkins Agents For Remote Code Execution

Security researchers recently uncovered a critical vulnerability in Node.js’s continuous integration infrastructure that allowed attackers to execute malicious code on internal Jenkins agents, potentially leading to a devastating supply chain attack. When multiple DevOps platforms work together to execute pipelines…

Hottest cybersecurity open-source tools of the month: April 2025

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. GoSearch: Open-source OSINT tool for uncovering digital footprints GoSearch is an open-source OSINT tool built to uncover digital footprints linked to specific…

Top solutions to watch after RSAC 2025

RSAC 2025 showcased a wave of innovation, with vendors unveiling technologies poised to redefine cybersecurity. From AI-powered defense to breakthroughs in identity protection, this year’s conference delivered a glimpse into the future. Here are the most interesting products that caught…