Tag: EN

What Are Your DDoS Testing Options in 2026?

No modern business can afford to ignore the threat of DDoS attacks. For many enterprises, reliable online services are critical to operations and reputation—while attackers continue to refine their tools and tactics. As a result, security teams can’t simply assume…

Royal Bahrain Hospital breach, Canada’s Loblaw breached, New York water laws

Payload Ransomware group claims breached of Royal Bahrain Hospital Canadian food retailer Loblaw confirms data breach New York cyber regulations for water organizations launch in 2027 Get links to all our stories in the show notes: https://cisoseries.com/cybersecurity-news-royal-bahrain-hospital-breach-canadas-loblaw-breached-new-york-water-laws/ Huge thanks to…

FortiGate Firewall Exploitation Fuels Network Breaches in New Attack Wave

Cybersecurity defenders identified a surge in network breaches originating from compromised FortiGate Next-Generation Firewalls. According to incident responders at SentinelOne, threat actors exploit recent vulnerabilities to extract configuration files, steal credentials, and establish deep network footholds. Attackers are primarily leveraging…

Attackers Exploit Teams, Quick Assist to Deploy Stealthy A0Backdoor

Attackers are evolving a well-known Microsoft Teams and Quick Assist social-engineering playbook to install a new, stealthy backdoor dubbed A0Backdoor. The campaign closely mirrors activity previously attributed to Blitz Brigantine (also tracked as Storm‑1811), a financially motivated group tied to Black…

The Privacy Problem With Meta’s Ray-Ban Smart Glasses

This episode discusses Meta Ray-Ban Smart Glasses, which blend a camera, microphone, AI features, and social media integration into sunglasses that look like normal fashion eyewear, raising major privacy concerns. It highlights reports that footage captured by the glasses may…

What smart factories keep getting wrong about cybersecurity

In this Help Net Security interview, Packsize CSO Troy Rydman breaks down the biggest vulnerabilities in smart factory environments today, from IoT devices and legacy systems to human error. He explains how unmanaged devices, from sensors to robotic components, often…