Aggregator
Report: The State of Secrets Sprawl 2025
GitGuardian’s State of Secrets Sprawl 2025 report shows no progress in combating secrets sprawl, with 23.8 million secrets leaked on public GitHub repositories in 2024—a 25% year-over-year increase. Despite GitHub Push Protection’s efforts, secrets sprawl is accelerating, especially with generic secrets, which made up 58% of all leaked credentials. More troubling, 70% of secrets leaked in 2022 remain active, significantly expanding the attack surface for threat actors. The report makes one thing clear: secrets management … More →
The post Report: The State of Secrets Sprawl 2025 appeared first on Help Net Security.
Vanta strengthens collaboration between security and GRC teams
Vanta announced a series of new features and capabilities to help security and GRC teams seamlessly collaborate across their organization and extended network. These releases—including team-based collaboration and granular user access, an integrated Vanta Exchange for vendor security reviews, enhanced audit capabilities and expanded security questionnaire automation—reduce manual processes and enable companies to manage trust as a team. With 65% of businesses reporting that customers, investors and suppliers increasingly require proof of compliance, maintaining a … More →
The post Vanta strengthens collaboration between security and GRC teams appeared first on Help Net Security.
Why Cybersecurity Needs More Business-Minded Leaders
752,000 Browser Phishing Attacks Mark 140% Increase YoY
Обновитесь или платите: Microsoft раскрывает будущее Windows 10 после 2025 года
CVE-2023-32110 | JupiterX Theme Plugin up to 3.0.0 on WordPress print_pane file inclusion
CVE-2023-38388 | JupiterX Core Premium Plugin up to 3.3.5 on WordPress unrestricted upload
CVE-2025-28857 | rankchecker Rankchecker.io Integration Plugin up to 1.0.9 on WordPress cross-site request forgery
Decoding a Malware Analyst: Essential Skills and Expertise
Malware analysis is a promising yet competitive career path, where education must be taken seriously to stand up against ever-evolving threats. The demand for such professionals has never been higher, but the requirements and expectations are not low either. A specific mindset and a number of well-developed soft skills are no less vital than a […]
The post Decoding a Malware Analyst: Essential Skills and Expertise appeared first on ANY.RUN's Cybersecurity Blog.
Leaked Black Basta Chats Suggest Russian Officials Aided Leader's Escape from Armenia
CVE-2017-2454 | Apple tvOS up to 10.1 WebKit memory corruption (HT207601 / EDB-41807)
APTs have been using zero-day Windows shortcut exploit for eight years (ZDI-CAN-25373)
State-sponsored threat actors and cybercrime groups from North Korea, Iran, Russia, and China have been exploiting a zero-day Windows vulnerability with no fix in sight for the last eight years, researchers with Trend Micro’s Zero Day Initiative have warned on Tuesday. The vulnerability, which doesn’t have a CVE number but is being tracked as ZDI-CAN-25373 by ZDI researchers, allowed attackers to surreptitiously execute malicious commands on a victim’s machine and deliver a variety of malware … More →
The post APTs have been using zero-day Windows shortcut exploit for eight years (ZDI-CAN-25373) appeared first on Help Net Security.
1Kosmos 1Key secures shared login environments and OT systems
1Kosmos announced 1Kosmos 1Key for shared account login environments. With FIDO-compliant biometric authentication, 1Kosmos 1Key addresses the pressing need for security, accountability, and auditability in settings where multiple users access shared accounts, such as operational technology (OT) systems, hospitality services, and other collaborative workspaces. Shared accounts are commonly used in both IT and OT environments where many users interact with a single workstation or application. However, shared access can also lead to security vulnerabilities, accountability … More →
The post 1Kosmos 1Key secures shared login environments and OT systems appeared first on Help Net Security.
CVE-2017-2454 | Apple iOS up to 10.2 WebKit memory corruption (HT207617 / EDB-41807)
CVE-2000-0647 | Texas Imperial Software WFTPD 2.4.1/2.4.1 Rc11/2.34/2.40 MLST Command denial of service (EDB-20102 / Nessus ID 10487)
Getting Started with BHE — Part 2
CVE-2024-55551 | Exasol 24.2.0 JDBC Driver injection
The 2024-2026 Root Zone KSK Rollover: Initial Observations and Early Trends
On Jan. 11, 2025, Verisign supported the Internet Corporation for Assigned Names and Numbers (ICANN) in taking a major step to ensure the continued security, stability, and resiliency of the Domain Name System (DNS). While imperceptible to most users, this action – specifically, the introduction of a new Domain Name System Security Extensions (DNSSEC) Key […]
The post The 2024-2026 Root Zone KSK Rollover: Initial Observations and Early Trends appeared first on Verisign Blog.
Elastic expands partnership with Tines to scale security operations
Elastic announced an expanded partnership with an integrated offering that includes Tines Workflow Automation and the Elastic Search AI Platform to simplify security and observability workflow automation. The partnership equips security teams with security orchestration, automation and response (SOAR) and AI-driven security analytics capabilities, while observability teams benefit from enhanced incident response automation. “We’re thrilled about the Elastic and Tines partnership—it’s been a game-changer for our team and our ability to protect our vast network … More →
The post Elastic expands partnership with Tines to scale security operations appeared first on Help Net Security.