Strategic AI readiness for cybersecurity: From hype to reality

AI readiness in cybersecurity involves more than just possessing the latest tools and technologies; it is a strategic necessity. Many companies could encounter serious repercussions, such as increased volumes of advanced cyber threats, if they fail to … Continue reading Strategic AI readiness for cybersecurity: From hype to reality

BlueToolkit: Open-source Bluetooth Classic vulnerability testing framework

BlueToolkit is an open-source tool that helps find security flaws in Bluetooth Classic devices. It runs known and custom exploits to test if a device is vulnerable. Right now, it includes 43 different exploits. Some are public, and others were made spe… Continue reading BlueToolkit: Open-source Bluetooth Classic vulnerability testing framework

Critical Next.js auth bypass vulnerability opens web apps to compromise (CVE-2025-29927)

A critical vulnerability (CVE-2025-29927) in the open source Next.js framework can be exploited by attackers to bypass authorization checks and gain unauthorized access to web pages they should no have access to (e.g., the web app’s admin panel)…. Continue reading Critical Next.js auth bypass vulnerability opens web apps to compromise (CVE-2025-29927)

Building cyber resilience in banking: Expert insights on strategy, risk, and regulation

In this Help Net Security interview, Matthew Darlage, CISO at Citizens, discusses key strategies for strengthening cyber resilience in banks. He underlines that adherence to frameworks like NIST is essential for continuous improvement and that data pro… Continue reading Building cyber resilience in banking: Expert insights on strategy, risk, and regulation

Framework Announces 12-Inch Laptop, 13-Inch AMD Laptop, Desktop PC

Tuesday was a big day for Framework: It announced a new 12-inch laptop, a 13-inch AMD Ryzen AI laptop, and a desktop PC.
The post Framework Announces 12-Inch Laptop, 13-Inch AMD Laptop, Desktop PC appeared first on Thurrott.com.
Continue reading Framework Announces 12-Inch Laptop, 13-Inch AMD Laptop, Desktop PC

AI security posture management will be needed before agentic AI takes hold

As I’m currently knee deep in testing agentic AI in all its forms, as well as new iterations of current generative AI models such as OpenAI’s O1, the complexities of securing AI bot frameworks for enterprise security teams are beginning to crystallize…. Continue reading AI security posture management will be needed before agentic AI takes hold

AI-driven insights transform security preparedness and recovery

In this Help Net Security interview, Arunava Bag, CTO at Digitate, discusses how organizations can recover digital operations after an incident, prioritize cybersecurity strategies, and secure digital operations with effective frameworks. What measures… Continue reading AI-driven insights transform security preparedness and recovery

EU takes decisive action on healthcare cybersecurity

The Commission has presented an EU action plan aimed at strengthening the cybersecurity of hospitals and healthcare providers. The initiative is an essential step in shielding the healthcare sector from cyber threats. Digitalization is revolutionizing … Continue reading EU takes decisive action on healthcare cybersecurity

A humble proposal: The InfoSec CIA triad should be expanded

The inconsistent and incomplete definitions of essential properties in information security create confusion within the InfoSec community, gaps in security controls, and may elevate the costs of incidents. In this article, I will analyze the CIA triad,… Continue reading A humble proposal: The InfoSec CIA triad should be expanded