
Cybersecurity

What is a Risk Assessment? | Definition from TechTarget
What is a risk assessment? Risk assessment is the process of identifying hazards that could negatively affect an organization’s ability to conduct business. These assessments help identify inherent business risks and prompt measures, processes and controls to reduce the impact of these risks on business operations. Risk assessments help ensure the health and safety of…

Top 5 AI SOC Analyst Platforms to Watch out for in 2025
As threats evolve in sophistication and frequency while cyber skills gaps persist, Security Operations Centres (SOCs) are increasingly turning to AI-driven platforms to enhance threat detection, streamline investigations, and automate responses. But which one is the best? Prophet Security (Best Overall) Prophet Security’s AI-native SOC platform deploys an “Agentic AI SOC Analyst” that autonomously triages,…

Why AI code assistants need a security reality check – Help Net Security
In this Help Net Security interview, Silviu Asandei, Security Specialist and Security Governance at Sonar, discusses how AI code assistants are transforming development workflows and impacting security. He explains how these tools can boost productivity but may also propagate vulnerabilities if not properly reviewed. What security risks do AI code assistants pose that developers and…

Sophos Firewall v21.5 is now available
Following a very busy and successful early access program, the Sophos Firewall team is pleased to announce that v21.5 is now available to all licensed Sophos partners and customers. This release brings an industry-first innovation: integrating Network Detection and Response (NDR), which enhances active threat detection on your network. What’s new overview Watch this brief…

Making it stick: How to get the most out of cybersecurity training
Security awareness training doesn’t have to be a snoozefest – games and stories can help instill ‘sticky’ habits that will kick in when a danger is near 28 Mar 2025 • , 5 min. read Let me preface this with an attempt at a story: Sarah’s eyes darted across the email subject line, which read:…

U.S. Seizes $7.74M in Crypto Tied to North Korea’s Global Fake IT Worker Network
The U.S. Department of Justice (DoJ) said it has filed a civil forfeiture complaint in federal court that targets over $7.74 million in cryptocurrency, non-fungible tokens (NFTs), and other digital assets allegedly linked to a global IT worker scheme orchestrated by North Korea. “For years, North Korea has exploited global remote IT contracting and cryptocurrency…

3 Top Multifactor Authentication Tool Providers in 2025
One of the leading and most effective security measures today is multifactor authentication. This foundational identity security technology is essential to verifying users and protecting logins. Finding the MFA tool that best suits your company’s needs can be overwhelming. Various vendors sell MFA products, each offering multiple options and services. Here, learn about three top…

Week in review: Microsoft fixes exploited zero-day, Mirai botnets target unpatched Wazuh servers – Help Net Security
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft fixes zero-day exploited for cyber espionage (CVE-2025-33053)For June 2025 Patch Tuesday, Microsoft has fixed 66 new CVEs, including a zero-day exploited in the wild (CVE-2025-33053). Unpatched Wazuh servers targeted by Mirai botnets (CVE-2025-24016)Two Mirai botnets are exploiting a critical…

June Patch Tuesday digs into 67 bugs
.Microsoft on Tuesday released 67 patches affecting 12 product families. Ten of the addressed issues, five involving 365 and Office and one involving SharePoint, are considered by Microsoft to be of Critical severity, and 17 have a CVSS base score of 8.0 or higher. One, an Important-severity RCE in Windows related to WEBDAV (CVE-2025-33053), is…

ESET takes part in global operation to disrupt Lumma Stealer
ESET has collaborated with Microsoft, BitSight, Lumen, Cloudflare, CleanDNS, and GMO Registry in a global disruption operation against Lumma Stealer, an infamous malware-as-a-service (MaaS) infostealer. The operation targeted Lumma Stealer infrastructure with all known C&C servers in the past year, rendering the exfiltration network, or a large part of it, nonoperational. Key points of this…