Overcoming legal and organizational challenges in ethical hacking

In this Help Net Security interview, Balázs Pózner, CEO at Hackrate, discusses the essential technical skills for ethical hackers and how they vary across different security domains. He explains how AI and machine learning enhance ethical hacking by st… Continue reading Overcoming legal and organizational challenges in ethical hacking

Proxmox Virtual Environment 8.3: SDN-firewall integration, faster container backups, and more!

The Proxmox Virtual Environment 8.3 enterprise virtualization solution features management tools and a user-friendly web interface, allowing you to deploy open-source solutions in clustered, highly available setups. This version is based on Debian 12.8… Continue reading Proxmox Virtual Environment 8.3: SDN-firewall integration, faster container backups, and more!

AxoSyslog: Open-source scalable security data processor

AxoSyslog is a syslog-ng fork, created and maintained by the original creator of syslog-ng, Balazs Scheidler, and his team. “We first started by making syslog-ng more cloud-ready: we packaged syslog-ng in a container, added helm charts, and made it mor… Continue reading AxoSyslog: Open-source scalable security data processor

GitHub Secure Open Source Fund: Project maintainers, apply now!

GitHub is calling on maintainers of open source projects to apply for the newly opened Secure Open Source Fund, to get funding and knowledge to improve the security and sustainability of their software. The program is funded by companies (AmEx Chaingua… Continue reading GitHub Secure Open Source Fund: Project maintainers, apply now!

Debunking myths about open-source security

In this Help Net Security interview, Stephanie Domas, CISO at Canonical, discusses common misconceptions about open-source security and how the community can work to dispel them. She explains how open-source solutions, contrary to myths, offer enterpri… Continue reading Debunking myths about open-source security

Attackers are hijacking Jupyter notebooks to host illegal Champions League streams

Normally reserved for data analysis, a cybersecurity firm caught online content pirates hosting soccer matches.

The post Attackers are hijacking Jupyter notebooks to host illegal Champions League streams appeared first on CyberScoop.

Continue reading Attackers are hijacking Jupyter notebooks to host illegal Champions League streams

Сrimeware and financial cyberthreats in 2025

Kaspersky’s GReAT looks back on the 2024 predictions about financial and crimeware threats, and explores potential cybercrime trends for 2025. Continue reading Сrimeware and financial cyberthreats in 2025

North Korean-linked hackers were caught experimenting with new macOS malware

Researchers can’t tell if the malware was used in a campaign, or North Korean operatives were caught before they could deploy it in the wild.

The post North Korean-linked hackers were caught experimenting with new macOS malware appeared first on CyberScoop.

Continue reading North Korean-linked hackers were caught experimenting with new macOS malware