Money mule networks evolve into hierarchical, business-like criminal enterprises – Help Net Security

Money mule networks evolve into hierarchical, business-like criminal enterprises – Help Net Security

In this Help Net Security interview, Michal Tresner, CEO of ThreatMark, discusses how cybercriminals are weaponizing AI, automation, and social engineering to industrialize money mule operations. He looks at how these networks have changed and how behavioral intelligence is helping to catch fraud. Tresner also shares practical tips for CISOs trying to stop mule activity…

Read More
How CISOs can justify security investments in financial terms – Help Net Security

How CISOs can justify security investments in financial terms – Help Net Security

In this Help Net Security interview, John Verry, Managing Director at CBIZ, discusses how insurers and financial risk professionals evaluate cybersecurity maturity through different lenses. He also shows how framing cyber risk in business terms can strengthen investment cases and elevate cybersecurity as a strategic driver. What should CISOs know about how insurers and financial…

Read More
Why AI code assistants need a security reality check – Help Net Security

Why AI code assistants need a security reality check – Help Net Security

In this Help Net Security interview, Silviu Asandei, Security Specialist and Security Governance at Sonar, discusses how AI code assistants are transforming development workflows and impacting security. He explains how these tools can boost productivity but may also propagate vulnerabilities if not properly reviewed. What security risks do AI code assistants pose that developers and…

Read More
Week in review: Microsoft fixes exploited zero-day, Mirai botnets target unpatched Wazuh servers – Help Net Security

Week in review: Microsoft fixes exploited zero-day, Mirai botnets target unpatched Wazuh servers – Help Net Security

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft fixes zero-day exploited for cyber espionage (CVE-2025-33053)For June 2025 Patch Tuesday, Microsoft has fixed 66 new CVEs, including a zero-day exploited in the wild (CVE-2025-33053). Unpatched Wazuh servers targeted by Mirai botnets (CVE-2025-24016)Two Mirai botnets are exploiting a critical…

Read More
Inside a Dark Adtech Empire Fed by Fake CAPTCHAs – Krebs on Security

Inside a Dark Adtech Empire Fed by Fake CAPTCHAs – Krebs on Security

Late last year, security researchers made a startling discovery: Kremlin-backed disinformation campaigns were bypassing moderation on social media platforms by leveraging the same malicious advertising technology that powers a sprawling ecosystem of online hucksters and website hackers. A new report on the fallout from that investigation finds this dark ad tech industry is far more…

Read More
How MCP Agents Help SaaS Security Teams Automate SOC 2 & HIPAA

How MCP Agents Help SaaS Security Teams Automate SOC 2 & HIPAA

Introduction Security and compliance teams at fast-growing SaaS companies are under constant pressure. Whether it’s a SOC 2 audit, HIPAA documentation, or staying updated with GDPR regulations, the compliance burden keeps growing—while the margin for error keeps shrinking. Despite having robust DevSecOps practices and cloud security tools in place, many teams still rely on spreadsheets,…

Read More