CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned of active exploitation of a high-severity security flaw impacting Gogs by adding it to its Known Exploited Vulnerabilities (KEV) catalog.
The vulnerability, tracked as CVE-2025… Continue reading CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution

Posted in Uncategorized

Rakuten Viber CISO/CTO on balancing encryption, abuse prevention, and platform resilience

In this Help Net Security interview, Liad Shnell, CISO and CTO at Rakuten Viber, discusses how messaging platforms have become critical infrastructure during crises and conflicts. He explains how it influences cybersecurity priorities, from encryption … Continue reading Rakuten Viber CISO/CTO on balancing encryption, abuse prevention, and platform resilience

Turning cyber metrics into decisions leaders can act on

In this Help Net Security video, Bryan Sacks, Field CISO at Myriad360, explains how security leaders can measure cybersecurity in ways that matter to executives and boards. He argues that metrics should support decisions, not exist for reporting alone…. Continue reading Turning cyber metrics into decisions leaders can act on

India demands crypto outfits geolocate customers, get a selfie to prove they’re real

Government is fed up with bad actors using digi-cash to fund dodgy deeds India’s government has updated the regulations it imposes on cryptocurrency services providers, as part of its efforts to combat fraud, money laundering, and terrorism.… Continue reading India demands crypto outfits geolocate customers, get a selfie to prove they’re real

Posted in Uncategorized